2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb, 0x1}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x168, 0x168, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x10, 0x3, 0x0, 0x4, 0x0, 0x401, [{0xf, 0x6, 0x400}, {0xb, 0x4, 0x8}, {0x6, 0x5, 0x80000001}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0xd86, [{0x9, 0x0, 0x5}, {0x7, 0x3, 0x8000}, {0x6, 0x4, 0x7}, {0x4, 0x3, 0x4}, {0x7, 0x2, 0xfff}, {0x3, 0x5, 0x9}, {0xe, 0x3, 0x3}]}, @union={0x6, 0x6, 0x0, 0x5, 0x0, 0x8001, [{0xb, 0x4, 0x7ff}, {0x4, 0x1, 0xfff}, {0x3, 0x2, 0xf7cc}, {0x10, 0x3, 0xff}, {0xb, 0x2, 0x80000001}, {0x8, 0x4, 0x1b}]}, @fwd={0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x18b, 0xc6, 0x1}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb, 0x1}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c0"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 2: syz_clone(0xc08ab000, 0x0, 0x5a1, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c0"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb, 0x1}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x2e, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c0"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb, 0x1}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x2e, 0xcb, 0x1}, 0x20) 14:39:37 executing program 2: syz_clone(0xc08ab000, 0x0, 0x5c6, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x2e, 0xcb, 0x1}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 2: syz_clone(0xc08ab000, 0x0, 0x5c7, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15c, 0x15c, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x10, 0x3, 0x0, 0x4, 0x0, 0x401, [{0xf, 0x6, 0x400}, {0xb, 0x4, 0x8}, {0x6, 0x5, 0x80000001}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0xd86, [{0x9, 0x0, 0x5}, {0x7, 0x3, 0x8000}, {0x6, 0x4, 0x7}, {0x4, 0x3, 0x4}, {0x7, 0x2, 0xfff}, {0x3, 0x5, 0x9}, {0xe, 0x3, 0x3}]}, @union={0x6, 0x6, 0x0, 0x5, 0x0, 0x8001, [{0xb, 0x4, 0x7ff}, {0x4, 0x1, 0xfff}, {0x3, 0x2, 0xf7cc}, {0x10, 0x3, 0xff}, {0xb, 0x2, 0x80000001}, {0x8, 0x4, 0x1b}]}, @fwd={0x1}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x17f, 0xc6, 0x1}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e5"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x3a, 0xcb}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x3a, 0xcb}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e5"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x150, 0x150, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x10, 0x3, 0x0, 0x4, 0x0, 0x401, [{0xf, 0x6, 0x400}, {0xb, 0x4, 0x8}, {0x6, 0x5, 0x80000001}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0xd86, [{0x9, 0x0, 0x5}, {0x7, 0x3, 0x8000}, {0x6, 0x4, 0x7}, {0x4, 0x3, 0x4}, {0x7, 0x2, 0xfff}, {0x3, 0x5, 0x9}, {0xe, 0x3, 0x3}]}, @union={0x6, 0x6, 0x0, 0x5, 0x0, 0x8001, [{0xb, 0x4, 0x7ff}, {0x4, 0x1, 0xfff}, {0x3, 0x2, 0xf7cc}, {0x10, 0x3, 0xff}, {0xb, 0x2, 0x80000001}, {0x8, 0x4, 0x1b}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x173, 0xc6, 0x1}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 2: syz_clone(0xc08ab000, 0x0, 0x600, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x10, 0x3, 0x0, 0x4, 0x0, 0x401, [{0xf, 0x6, 0x400}, {0xb, 0x4, 0x8}, {0x6, 0x5, 0x80000001}]}, @struct={0x8, 0x7, 0x0, 0x4, 0x1, 0xd86, [{0x9, 0x0, 0x5}, {0x7, 0x3, 0x8000}, {0x6, 0x4, 0x7}, {0x4, 0x3, 0x4}, {0x7, 0x2, 0xfff}, {0x3, 0x5, 0x9}, {0xe, 0x3, 0x3}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x11f, 0xc6, 0x1}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@const, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/203, 0x3a, 0xcb}, 0x20) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x20, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e5"}], 0x20}, 0x40) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:37 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/101, 0x65, 0x0, &(0x7f0000000080)=""/120, 0x78}}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x7, [@fwd={0xa}, @fwd={0x3}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @fwd={0xb}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x1, 0x2}, {0xf, 0x1}, {0x0, 0x1}, {0x7, 0x5}, {0x10, 0x4}, {0xf, 0x5}, {0xc, 0x1}]}, @func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x2e, 0x2e, 0x61, 0x61, 0x5f]}}, &(0x7f0000000540)=""/17, 0x9f, 0x11}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r2, 0x20, &(0x7f0000000400)={&(0x7f0000000280)=""/117, 0x75, 0x0, &(0x7f0000000300)=""/196, 0xc4}}, 0x10) write$rfkill(r1, &(0x7f0000000240)={0xffffffff, 0x3, 0x0, 0x1, 0x1}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x1, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0x4) 14:39:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}, @struct={0x10, 0x3, 0x0, 0x4, 0x0, 0x401, [{0xf, 0x6, 0x400}, {0xb, 0x4, 0x8}, {0x6, 0x5, 0x80000001}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0xbf, 0xc6, 0x1}, 0x20) 14:39:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0x601, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @var={0xa, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x8f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x20, &(0x7f0000000100)={&(0x7f0000000000)=""/101, 0x65, 0x0, &(0x7f0000000080)=""/120, 0x78}}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x7, [@fwd={0xa}, @fwd={0x3}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @fwd={0xb}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x1, 0x2}, {0xf, 0x1}, {0x0, 0x1}, {0x7, 0x5}, {0x10, 0x4}, {0xf, 0x5}, {0xc, 0x1}]}, @func={0xd, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x2e, 0x2e, 0x61, 0x61, 0x5f]}}, &(0x7f0000000540)=""/17, 0x9f, 0x11}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r2, 0x20, &(0x7f0000000400)={&(0x7f0000000280)=""/117, 0x75, 0x0, &(0x7f0000000300)=""/196, 0xc4}}, 0x10) write$rfkill(r1, &(0x7f0000000240)={0xffffffff, 0x3, 0x0, 0x1, 0x1}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x1, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0x4) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x1}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) 14:39:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x7ffff000}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x40) bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:38 executing program 5: syz_clone(0xc08ab000, 0x0, 0x600, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x7f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0x700, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}, @fwd={0x2}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x6b, 0xc6, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x7ffff000}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x40) bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x7ffff000}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x40) bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0x802, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="93", 0x7ffff000}, {0x0}], 0x3, &(0x7f0000000280)=[{0x28, 0x0, 0x0, "f1ae77b2a7ef55b413864c73c001c3e563"}], 0x28}, 0x40) bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00800000", @ANYRES16=0x0, @ANYBLOB="000000000000000000000f000000"], 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r1) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x4, 0x1, 0x3}, 0xd4f4}}, 0x18) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0x900, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb}, 0x20) 14:39:38 executing program 0: syz_clone(0xc08ab007, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@const, @enum]}}, &(0x7f0000000080)=""/203, 0x32, 0xcb}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 4: syz_clone(0xc08ab000, 0x0, 0x802, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@enum={0x5, 0x5, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x57, 0xc6, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xb, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}, {0x8, 0xffffffff}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x5f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xb, [@enum={0x5, 0x4, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x4f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000100000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xbc}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7ff}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x6c}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x47, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, 0x0, 0x119, 0x0, 0x1}, 0x20) socket$inet_icmp(0x2, 0x2, 0x1) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000100000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xbc}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7ff}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x6c}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x3f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000100000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xbc}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7ff}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x6c}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r3, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000007c0)={0xa4, 0x0, &(0x7f0000000640)=[@transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000400)={@fda={0x66646185, 0x4, 0x2, 0x3b}, @fd={0x66642a85, 0x0, r4}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/36, 0x24, 0x2}}, &(0x7f0000000480)={0x0, 0x20, 0x38}}}, @dead_binder_done, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@fda={0x66646185, 0x3, 0x2, 0x6}, @flat=@handle={0x73682a85, 0x0, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f00000004c0)=""/154, 0x9a, 0x0, 0x2d}}, &(0x7f0000000600)={0x0, 0x20, 0x38}}, 0x400}], 0xbb, 0x0, &(0x7f0000000700)="772369118cf3fb68080f34b1fdab7e343a65815cc845f7a8471570449ab1b1e9380846a9b54d864332ca2dd803b2a1130a7c38bf71ca23ebf5f40c77eebb960a6b82b3de2573487e85eaa4016c8e60c9f0bbe3105cf2db51c275294837374462593dfec2d42792c6dc674d3e14a339018d4d0d668f386e4a8b0e6a93168d765e157f564197c197ef12d3a20d4edea5307eae8bd653d4f2b5b22847e2171cc189a3a5150c06fa2ebe0e5c87f28cfe4e80a00b019c97b7ef2cd88133"}) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/203, 0x0, 0xcb, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r3, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000007c0)={0xa4, 0x0, &(0x7f0000000640)=[@transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000400)={@fda={0x66646185, 0x4, 0x2, 0x3b}, @fd={0x66642a85, 0x0, r4}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/36, 0x24, 0x2}}, &(0x7f0000000480)={0x0, 0x20, 0x38}}}, @dead_binder_done, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@fda={0x66646185, 0x3, 0x2, 0x6}, @flat=@handle={0x73682a85, 0x0, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f00000004c0)=""/154, 0x9a, 0x0, 0x2d}}, &(0x7f0000000600)={0x0, 0x20, 0x38}}, 0x400}], 0xbb, 0x0, &(0x7f0000000700)="772369118cf3fb68080f34b1fdab7e343a65815cc845f7a8471570449ab1b1e9380846a9b54d864332ca2dd803b2a1130a7c38bf71ca23ebf5f40c77eebb960a6b82b3de2573487e85eaa4016c8e60c9f0bbe3105cf2db51c275294837374462593dfec2d42792c6dc674d3e14a339018d4d0d668f386e4a8b0e6a93168d765e157f564197c197ef12d3a20d4edea5307eae8bd653d4f2b5b22847e2171cc189a3a5150c06fa2ebe0e5c87f28cfe4e80a00b019c97b7ef2cd88133"}) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="0000100000"], 0x14}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r3, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r4, 0x21, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000007c0)={0xa4, 0x0, &(0x7f0000000640)=[@transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000400)={@fda={0x66646185, 0x4, 0x2, 0x3b}, @fd={0x66642a85, 0x0, r4}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/36, 0x24, 0x2}}, &(0x7f0000000480)={0x0, 0x20, 0x38}}}, @dead_binder_done, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000580)={@fda={0x66646185, 0x3, 0x2, 0x6}, @flat=@handle={0x73682a85, 0x0, 0x2}, @ptr={0x70742a85, 0x1, &(0x7f00000004c0)=""/154, 0x9a, 0x0, 0x2d}}, &(0x7f0000000600)={0x0, 0x20, 0x38}}, 0x400}], 0xbb, 0x0, &(0x7f0000000700)="772369118cf3fb68080f34b1fdab7e343a65815cc845f7a8471570449ab1b1e9380846a9b54d864332ca2dd803b2a1130a7c38bf71ca23ebf5f40c77eebb960a6b82b3de2573487e85eaa4016c8e60c9f0bbe3105cf2db51c275294837374462593dfec2d42792c6dc674d3e14a339018d4d0d668f386e4a8b0e6a93168d765e157f564197c197ef12d3a20d4edea5307eae8bd653d4f2b5b22847e2171cc189a3a5150c06fa2ebe0e5c87f28cfe4e80a00b019c97b7ef2cd88133"}) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2d, 0xc6, 0x1}, 0x20) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x9, 0x6c9d}, {0xb, 0x8}]}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x6f, 0xc1, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r2, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r3, 0x21, 0x0, 0x0, 0x0) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:38 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc01, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r2, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) socket$inet6_dccp(0xa, 0x6, 0x0) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:38 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000a40)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="88010000", @ANYRES16=r2, @ANYBLOB="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"/390], 0x188}, 0x1, 0x0, 0x0, 0x91}, 0x11) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0xd00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}, {0xd, 0xcb}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x57, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/203, 0x26, 0xcb}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xb, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}, {0xe, 0x3d}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x4f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1100, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}, {0xa, 0x6}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x47, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}, @const={0x4, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x53, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000008000000000074d78827e45b0ea2305f61612e00"], &(0x7f0000000040)=""/229, 0x20, 0xe5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@fwd={0x7}, @fwd={0x5}, @restrict={0xd}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x47, 0xc1, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}, {0x8, 0x9c}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x3f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@fwd={0x7}, @fwd={0x5}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x3b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xf8000000}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x1ff, [{0x6, 0x4, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0xa8, 0xd8, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1400, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xf8000000}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xf8000000}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1600, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000300)=""/216, 0x0, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xf8000000}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000300)=""/216, 0x0, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xb, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x37, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000300)=""/216, 0x0, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30]}}, &(0x7f0000000240)=""/198, 0x36, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61]}}, &(0x7f0000000380)=""/193, 0x2e, 0xc1, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1800, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x90, 0xd8, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30]}}, &(0x7f0000000380)=""/193, 0x2d, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}, @fwd={0x5}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x80, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f]}}, &(0x7f0000000240)=""/198, 0x35, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x74, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1a00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x68, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x1c, 0xd8, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x1c, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x1c, 0xd8, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:39 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c02, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x68, 0xd8, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x68, 0xd8, 0x1}, 0x20) 14:39:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}, {0xf, 0x7}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x68, 0xd8, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1d02, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x4, [@enum={0x3, 0x7, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}, {0xd, 0x6}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x60, 0xd8, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1e00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x4, [@enum={0x3, 0x6, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}, {0xa, 0xfffffff0}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x58, 0xd8, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@enum={0x3, 0x5, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}, {0x2, 0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x50, 0xd8, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1f00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x4, [@enum={0x3, 0x4, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}, {0x10, 0x8}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x48, 0xd8, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@enum={0x3, 0x3, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}, {0xe, 0x2}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x40, 0xd8, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@enum={0x3, 0x2, 0x0, 0x6, 0x4, [{0x0, 0x1}, {0x2, 0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x38, 0xd8, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x1}]}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x30, 0xd8, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x2e, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x61, 0x5f]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2400, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x61, 0x0]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2600, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x3}]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/216, 0x27, 0xd8, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2d02, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 14:39:40 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3002, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 14:39:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 14:39:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8}, 0x20) 14:39:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3500, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2c, 0x0, 0x1}, 0x20) 14:39:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x34, 0x0, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x34, 0x0, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6}, 0x20) 14:39:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000300)=""/216, 0x28, 0xd8}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3800, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x34, 0x0, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6}, 0x20) 14:39:41 executing program 4: syz_clone(0xc08ab000, 0x0, 0x2200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3a00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x2f, 0xc1, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x34, 0xc6}, 0x20) 14:39:41 executing program 4: syz_clone(0xc08ab000, 0x0, 0x3800, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3f00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 4: syz_clone(0xc08ab000, 0x0, 0x3800, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 4: syz_clone(0xc08ab000, 0x0, 0x3800, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/193, 0x0, 0xc1, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4100, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 4: syz_clone(0xc08ab000, 0x0, 0x3f00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61, 0x4f]}}, &(0x7f0000000380)=""/193, 0x23, 0xc1, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4a00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30, 0x61]}}, &(0x7f0000000380)=""/193, 0x2e, 0xc1, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0, 0x30]}}, &(0x7f0000000380)=""/193, 0x2d, 0xc1, 0x1}, 0x20) 14:39:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/193, 0x2c, 0xc1, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6700, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x2e]}}, &(0x7f0000000380)=""/193, 0x2b, 0xc1, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x23, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd]}, {0x0, [0x5f, 0x0, 0x30, 0x61]}}, &(0x7f0000000380)=""/193, 0x2a, 0xc1, 0x1}, 0x20) 14:39:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f, 0x30]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x5f, 0x0, 0x30]}}, &(0x7f0000000380)=""/193, 0x29, 0xc1, 0x1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6802, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2d, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000380)=""/193, 0x28, 0xc1, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61, 0x2e]}}, &(0x7f0000000240)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@fwd]}, {0x0, [0x5f]}}, &(0x7f0000000380)=""/193, 0x27, 0xc1, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6d03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000380)=""/193, 0x26, 0xc1, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x29, 0xc6, 0x1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7501, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x28, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000380)=""/193, 0x26, 0xc1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7502, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000380)=""/193, 0x26, 0xc1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000380)=""/193, 0x26, 0xc1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7a02, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x29, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 5: syz_clone(0xc08ab000, 0x0, 0xc00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x29, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x29, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x8fff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1596c21756d58f58}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r2, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000000}, 0x4) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000500)=0x9, 0x4) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000400)={'sit0\x00', &(0x7f0000000380)={'syztnl2\x00', r3, 0x0, 0x0, 0x7, 0x7, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x40, 0x1, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f00000004c0)={'syztnl2\x00', &(0x7f0000000440)={'syztnl0\x00', r6, 0x2f, 0x2, 0x7, 0x6e2, 0x31, @mcast2, @remote, 0x10, 0x1, 0x7, 0x8}}) ioctl$RFKILL_IOCTL_NOINPUT(r4, 0x5201) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r4, 0x20, &(0x7f00000000c0)={&(0x7f0000000000)=""/126, 0x7e, 0x0, &(0x7f0000000080)=""/36, 0x24}}, 0x10) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000200)={0x0, 0x0, 0xda, 0x0, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x5f, 0x2e, 0x30]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0x9903, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 1) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e]}}, &(0x7f0000000240)=""/198, 0x30, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x2e, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 2) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 1) [ 1486.173916][ T1752] FAULT_INJECTION: forcing a failure. [ 1486.173916][ T1752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.174004][ T1752] CPU: 0 PID: 1752 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.174029][ T1752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.174042][ T1752] Call Trace: [ 1486.174047][ T1752] [ 1486.174054][ T1752] dump_stack_lvl+0xd6/0x122 [ 1486.174156][ T1752] dump_stack+0x11/0x12 [ 1486.174178][ T1752] should_fail+0x242/0x250 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa105, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 3) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 2) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 3) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 4) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 5) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) [ 1486.174200][ T1752] should_fail_usercopy+0x16/0x20 [ 1486.174243][ T1752] _copy_from_user+0x1a/0xc0 [ 1486.174264][ T1752] __sys_bpf+0x1f2/0x630 [ 1486.174295][ T1752] __x64_sys_bpf+0x3f/0x50 [ 1486.174325][ T1752] do_syscall_64+0x2b/0x70 [ 1486.174348][ T1752] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.174440][ T1752] RIP: 0033:0x7f5e828fa109 14:39:42 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 4) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 6) [ 1486.174457][ T1752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.174477][ T1752] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.174579][ T1752] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.174594][ T1752] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 7) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 5) 14:39:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:42 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.174608][ T1752] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.174631][ T1752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.174644][ T1752] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.174725][ T1752] [ 1486.247240][ T1772] FAULT_INJECTION: forcing a failure. [ 1486.247240][ T1772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.247263][ T1772] CPU: 1 PID: 1772 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.247283][ T1772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.247293][ T1772] Call Trace: [ 1486.247297][ T1772] [ 1486.247350][ T1772] dump_stack_lvl+0xd6/0x122 [ 1486.247376][ T1772] dump_stack+0x11/0x12 [ 1486.247401][ T1772] should_fail+0x242/0x250 [ 1486.247421][ T1772] should_fail_usercopy+0x16/0x20 [ 1486.247440][ T1772] _copy_from_user+0x1a/0xc0 [ 1486.247461][ T1772] __sys_bpf+0x1f2/0x630 [ 1486.247533][ T1772] __x64_sys_bpf+0x3f/0x50 [ 1486.247559][ T1772] do_syscall_64+0x2b/0x70 14:39:43 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb901, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 6) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 8) 14:39:43 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:43 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) [ 1486.247584][ T1772] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.247608][ T1772] RIP: 0033:0x7f81dcc6b109 [ 1486.247624][ T1772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.247644][ T1772] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 9) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 7) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1486.247665][ T1772] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1486.247703][ T1772] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.247716][ T1772] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.247729][ T1772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.247742][ T1772] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1486.247772][ T1772] [ 1486.363127][ T1806] FAULT_INJECTION: forcing a failure. [ 1486.363127][ T1806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.363152][ T1806] CPU: 0 PID: 1806 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.363237][ T1806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.363323][ T1806] Call Trace: [ 1486.363329][ T1806] [ 1486.363408][ T1806] dump_stack_lvl+0xd6/0x122 [ 1486.363433][ T1806] dump_stack+0x11/0x12 [ 1486.363453][ T1806] should_fail+0x242/0x250 [ 1486.363481][ T1806] should_fail_usercopy+0x16/0x20 [ 1486.363501][ T1806] _copy_from_user+0x1a/0xc0 [ 1486.363520][ T1806] btf_new_fd+0x233/0x600 [ 1486.363543][ T1806] bpf_btf_load+0x69/0x80 [ 1486.363565][ T1806] __sys_bpf+0x493/0x630 [ 1486.363594][ T1806] __x64_sys_bpf+0x3f/0x50 [ 1486.363623][ T1806] do_syscall_64+0x2b/0x70 [ 1486.363697][ T1806] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.363802][ T1806] RIP: 0033:0x7f5e828fa109 [ 1486.363817][ T1806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:43 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 10) 14:39:43 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 8) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 11) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 1) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) 14:39:43 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 9) [ 1486.363836][ T1806] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.363855][ T1806] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.363947][ T1806] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) [ 1486.363960][ T1806] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.363973][ T1806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.363987][ T1806] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.364015][ T1806] [ 1486.425895][ T1821] FAULT_INJECTION: forcing a failure. [ 1486.425895][ T1821] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.425920][ T1821] CPU: 1 PID: 1821 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.426009][ T1821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.426020][ T1821] Call Trace: 14:39:43 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc605, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:43 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0xda}, 0x20) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 2) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 12) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 10) [ 1486.426027][ T1821] [ 1486.426034][ T1821] dump_stack_lvl+0xd6/0x122 [ 1486.426061][ T1821] dump_stack+0x11/0x12 [ 1486.426081][ T1821] should_fail+0x242/0x250 [ 1486.426148][ T1821] should_fail_usercopy+0x16/0x20 [ 1486.426170][ T1821] _copy_to_user+0x1a/0x90 [ 1486.426190][ T1821] bpf_verifier_vlog+0x137/0x230 [ 1486.426240][ T1821] __btf_verifier_log+0x80/0xa0 [ 1486.426298][ T1821] ? btf_parse_hdr+0x211/0x460 [ 1486.426322][ T1821] ? check_heap_object+0x1ab/0x3e0 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 11) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 3) 14:39:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 13) [ 1486.426389][ T1821] btf_parse_hdr+0x22d/0x460 [ 1486.426456][ T1821] btf_new_fd+0x2af/0x600 [ 1486.426477][ T1821] bpf_btf_load+0x69/0x80 [ 1486.426493][ T1821] __sys_bpf+0x493/0x630 [ 1486.426523][ T1821] __x64_sys_bpf+0x3f/0x50 [ 1486.426546][ T1821] do_syscall_64+0x2b/0x70 [ 1486.426568][ T1821] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.426633][ T1821] RIP: 0033:0x7f5e828fa109 [ 1486.426697][ T1821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.426717][ T1821] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.426738][ T1821] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.426751][ T1821] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.426765][ T1821] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.426801][ T1821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.426858][ T1821] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.426875][ T1821] [ 1486.468362][ T1838] FAULT_INJECTION: forcing a failure. [ 1486.468362][ T1838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.468388][ T1838] CPU: 1 PID: 1838 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.468413][ T1838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.468425][ T1838] Call Trace: [ 1486.468432][ T1838] [ 1486.468439][ T1838] dump_stack_lvl+0xd6/0x122 14:39:43 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc705, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 12) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 4) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 14) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 1) [ 1486.468513][ T1838] dump_stack+0x11/0x12 [ 1486.468534][ T1838] should_fail+0x242/0x250 [ 1486.468554][ T1838] should_fail_usercopy+0x16/0x20 [ 1486.468577][ T1838] _copy_to_user+0x1a/0x90 [ 1486.468599][ T1838] bpf_verifier_vlog+0x137/0x230 [ 1486.468622][ T1838] __btf_verifier_log+0x80/0xa0 [ 1486.468657][ T1838] ? btf_parse_hdr+0x237/0x460 [ 1486.468678][ T1838] ? check_heap_object+0x1ab/0x3e0 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 15) 14:39:43 executing program 3: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 5) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 13) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 2) 14:39:43 executing program 3: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.468765][ T1838] btf_parse_hdr+0x24e/0x460 [ 1486.468787][ T1838] btf_new_fd+0x2af/0x600 [ 1486.468809][ T1838] bpf_btf_load+0x69/0x80 [ 1486.468828][ T1838] __sys_bpf+0x493/0x630 [ 1486.468880][ T1838] __x64_sys_bpf+0x3f/0x50 [ 1486.468904][ T1838] do_syscall_64+0x2b/0x70 [ 1486.468926][ T1838] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.468949][ T1838] RIP: 0033:0x7f5e828fa109 14:39:43 executing program 2: syz_clone(0xc08ab000, 0x0, 0xda03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 16) 14:39:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 6) 14:39:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 3) 14:39:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 14) 14:39:43 executing program 3: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.468964][ T1838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.469054][ T1838] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.469073][ T1838] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.469092][ T1838] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.469105][ T1838] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 15) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 4) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 17) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 7) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.469118][ T1838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.469201][ T1838] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.469219][ T1838] [ 1486.644351][ T1853] FAULT_INJECTION: forcing a failure. [ 1486.644351][ T1853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.644378][ T1853] CPU: 1 PID: 1853 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.644432][ T1853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.644444][ T1853] Call Trace: [ 1486.644450][ T1853] [ 1486.644456][ T1853] dump_stack_lvl+0xd6/0x122 [ 1486.644484][ T1853] dump_stack+0x11/0x12 [ 1486.644506][ T1853] should_fail+0x242/0x250 [ 1486.644597][ T1853] should_fail_usercopy+0x16/0x20 [ 1486.644618][ T1853] _copy_to_user+0x1a/0x90 [ 1486.644642][ T1853] bpf_verifier_vlog+0x137/0x230 [ 1486.644666][ T1853] __btf_verifier_log+0x80/0xa0 [ 1486.644689][ T1853] ? btf_parse_hdr+0x258/0x460 14:39:44 executing program 2: syz_clone(0xc08ab000, 0x0, 0xdc03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 5) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 16) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 18) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 8) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 6) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 17) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 9) [ 1486.644709][ T1853] ? check_heap_object+0x1ab/0x3e0 [ 1486.644912][ T1853] btf_parse_hdr+0x26f/0x460 [ 1486.644933][ T1853] btf_new_fd+0x2af/0x600 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 19) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 7) [ 1486.644966][ T1853] bpf_btf_load+0x69/0x80 [ 1486.644983][ T1853] __sys_bpf+0x493/0x630 [ 1486.645010][ T1853] __x64_sys_bpf+0x3f/0x50 [ 1486.645083][ T1853] do_syscall_64+0x2b/0x70 [ 1486.645105][ T1853] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.645208][ T1853] RIP: 0033:0x7f5e828fa109 [ 1486.645224][ T1853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.645242][ T1853] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.645267][ T1853] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.645279][ T1853] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.645293][ T1853] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.645306][ T1853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.645368][ T1853] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 14:39:44 executing program 2: syz_clone(0xc08ab000, 0x0, 0xde03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 18) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 10) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 8) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 20) [ 1486.645384][ T1853] [ 1486.655915][ T1858] FAULT_INJECTION: forcing a failure. [ 1486.655915][ T1858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.655940][ T1858] CPU: 1 PID: 1858 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.655964][ T1858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.655975][ T1858] Call Trace: [ 1486.655980][ T1858] [ 1486.655987][ T1858] dump_stack_lvl+0xd6/0x122 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.656013][ T1858] dump_stack+0x11/0x12 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 19) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 21) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 11) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 9) [ 1486.656105][ T1858] should_fail+0x242/0x250 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.656127][ T1858] should_fail_usercopy+0x16/0x20 [ 1486.656168][ T1858] _copy_to_user+0x1a/0x90 [ 1486.656187][ T1858] bpf_verifier_vlog+0x137/0x230 [ 1486.656209][ T1858] __btf_verifier_log+0x80/0xa0 [ 1486.656232][ T1858] ? btf_parse_hdr+0x211/0x460 [ 1486.656254][ T1858] ? check_heap_object+0x1ab/0x3e0 [ 1486.656347][ T1858] btf_parse_hdr+0x22d/0x460 14:39:44 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 20) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 22) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 12) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 10) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 21) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) (fail_nth: 23) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 11) [ 1486.656369][ T1858] btf_new_fd+0x2af/0x600 [ 1486.656391][ T1858] bpf_btf_load+0x69/0x80 [ 1486.656408][ T1858] __sys_bpf+0x493/0x630 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 13) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x0, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.656516][ T1858] __x64_sys_bpf+0x3f/0x50 [ 1486.656541][ T1858] do_syscall_64+0x2b/0x70 [ 1486.656563][ T1858] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.656585][ T1858] RIP: 0033:0x7f81dcc6b109 [ 1486.656601][ T1858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.656650][ T1858] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.656670][ T1858] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 14:39:44 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe003, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 22) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 12) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 14) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x0, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 23) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 15) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x0, 0x2, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.656683][ T1858] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.656725][ T1858] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.656738][ T1858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 13) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 24) [ 1486.656751][ T1858] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1486.656767][ T1858] [ 1486.698111][ T1866] FAULT_INJECTION: forcing a failure. [ 1486.698111][ T1866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.698136][ T1866] CPU: 1 PID: 1866 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.698162][ T1866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.698175][ T1866] Call Trace: [ 1486.698180][ T1866] [ 1486.698186][ T1866] dump_stack_lvl+0xd6/0x122 [ 1486.698213][ T1866] dump_stack+0x11/0x12 [ 1486.698237][ T1866] should_fail+0x242/0x250 [ 1486.698259][ T1866] should_fail_usercopy+0x16/0x20 [ 1486.698279][ T1866] _copy_to_user+0x1a/0x90 [ 1486.698299][ T1866] bpf_verifier_vlog+0x137/0x230 [ 1486.698403][ T1866] __btf_verifier_log+0x80/0xa0 [ 1486.698427][ T1866] ? btf_parse_hdr+0x258/0x460 [ 1486.698465][ T1866] btf_parse_hdr+0x26f/0x460 [ 1486.698488][ T1866] btf_new_fd+0x2af/0x600 [ 1486.698509][ T1866] bpf_btf_load+0x69/0x80 [ 1486.698526][ T1866] __sys_bpf+0x493/0x630 [ 1486.698629][ T1866] __x64_sys_bpf+0x3f/0x50 [ 1486.698652][ T1866] do_syscall_64+0x2b/0x70 [ 1486.698674][ T1866] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:44 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe203, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 16) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 14) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 25) [ 1486.698707][ T1866] RIP: 0033:0x7f5e828fa109 [ 1486.698722][ T1866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 17) 14:39:44 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 26) 14:39:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 15) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (fail_nth: 27) [ 1486.698740][ T1866] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.698761][ T1866] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.698775][ T1866] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.698789][ T1866] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.698831][ T1866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.698845][ T1866] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.698861][ T1866] [ 1486.724630][ T1872] FAULT_INJECTION: forcing a failure. [ 1486.724630][ T1872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.724718][ T1872] CPU: 1 PID: 1872 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe403, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 18) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 16) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 17) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (fail_nth: 19) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.724743][ T1872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.724792][ T1872] Call Trace: [ 1486.724798][ T1872] 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1486.724804][ T1872] dump_stack_lvl+0xd6/0x122 [ 1486.724832][ T1872] dump_stack+0x11/0x12 [ 1486.724852][ T1872] should_fail+0x242/0x250 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe603, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 18) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x3, 0x0, 0x0, 0x25dfdbff, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 19) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.724932][ T1872] should_fail_usercopy+0x16/0x20 [ 1486.724986][ T1872] _copy_to_user+0x1a/0x90 [ 1486.725083][ T1872] bpf_verifier_vlog+0x137/0x230 [ 1486.725105][ T1872] __btf_verifier_log+0x80/0xa0 [ 1486.725129][ T1872] ? btf_parse_hdr+0x237/0x460 [ 1486.725212][ T1872] ? check_heap_object+0x1ab/0x3e0 [ 1486.725241][ T1872] btf_parse_hdr+0x24e/0x460 [ 1486.725263][ T1872] btf_new_fd+0x2af/0x600 [ 1486.725284][ T1872] bpf_btf_load+0x69/0x80 [ 1486.725302][ T1872] __sys_bpf+0x493/0x630 [ 1486.725331][ T1872] __x64_sys_bpf+0x3f/0x50 [ 1486.725412][ T1872] do_syscall_64+0x2b/0x70 [ 1486.725435][ T1872] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.725459][ T1872] RIP: 0033:0x7f81dcc6b109 [ 1486.725474][ T1872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.725493][ T1872] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe803, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e24}]}, 0x18}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.725566][ T1872] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1486.725579][ T1872] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.725593][ T1872] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 21) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.725606][ T1872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.725618][ T1872] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1486.725634][ T1872] 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xea03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 22) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.904917][ T1880] FAULT_INJECTION: forcing a failure. [ 1486.904917][ T1880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.904943][ T1880] CPU: 0 PID: 1880 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.905035][ T1880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.905047][ T1880] Call Trace: [ 1486.905052][ T1880] [ 1486.905059][ T1880] dump_stack_lvl+0xd6/0x122 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 23) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.905085][ T1880] dump_stack+0x11/0x12 [ 1486.905116][ T1880] should_fail+0x242/0x250 [ 1486.905219][ T1880] should_fail_usercopy+0x16/0x20 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xec03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 24) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 25) [ 1486.905241][ T1880] _copy_to_user+0x1a/0x90 [ 1486.905261][ T1880] bpf_verifier_vlog+0x137/0x230 [ 1486.905282][ T1880] __btf_verifier_log+0x80/0xa0 [ 1486.905360][ T1880] ? btf_parse_hdr+0x299/0x460 [ 1486.905381][ T1880] ? check_heap_object+0x1ab/0x3e0 [ 1486.905418][ T1880] btf_parse_hdr+0x2af/0x460 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1486.905440][ T1880] btf_new_fd+0x2af/0x600 [ 1486.905495][ T1880] bpf_btf_load+0x69/0x80 [ 1486.905514][ T1880] __sys_bpf+0x493/0x630 [ 1486.905542][ T1880] __x64_sys_bpf+0x3f/0x50 [ 1486.905566][ T1880] do_syscall_64+0x2b/0x70 [ 1486.905645][ T1880] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.905670][ T1880] RIP: 0033:0x7f5e828fa109 [ 1486.905686][ T1880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.905705][ T1880] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xee03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 26) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.905727][ T1880] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 27) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x81) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x81) [ 1486.905772][ T1880] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.905785][ T1880] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 14:39:45 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf003, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) (fail_nth: 28) 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x81) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.905798][ T1880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1486.905812][ T1880] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.905827][ T1880] [ 1486.907569][ T1888] FAULT_INJECTION: forcing a failure. [ 1486.907569][ T1888] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:45 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:45 executing program 4: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:45 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.907591][ T1888] CPU: 0 PID: 1888 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.907682][ T1888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf203, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.907695][ T1888] Call Trace: [ 1486.907700][ T1888] [ 1486.907707][ T1888] dump_stack_lvl+0xd6/0x122 [ 1486.907732][ T1888] dump_stack+0x11/0x12 [ 1486.907825][ T1888] should_fail+0x242/0x250 [ 1486.907845][ T1888] should_fail_usercopy+0x16/0x20 [ 1486.907867][ T1888] _copy_to_user+0x1a/0x90 [ 1486.907935][ T1888] bpf_verifier_vlog+0x137/0x230 [ 1486.907956][ T1888] __btf_verifier_log+0x80/0xa0 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1486.908049][ T1888] ? btf_parse_hdr+0x258/0x460 [ 1486.908071][ T1888] ? check_heap_object+0x1ab/0x3e0 [ 1486.908098][ T1888] btf_parse_hdr+0x26f/0x460 [ 1486.908162][ T1888] btf_new_fd+0x2af/0x600 [ 1486.908218][ T1888] bpf_btf_load+0x69/0x80 [ 1486.908236][ T1888] __sys_bpf+0x493/0x630 [ 1486.908267][ T1888] __x64_sys_bpf+0x3f/0x50 [ 1486.908293][ T1888] do_syscall_64+0x2b/0x70 [ 1486.908324][ T1888] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.908345][ T1888] RIP: 0033:0x7f81dcc6b109 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf403, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) r1 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffd}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.908360][ T1888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1486.908378][ T1888] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.908398][ T1888] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf603, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.908441][ T1888] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.908455][ T1888] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.908468][ T1888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.908482][ T1888] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1486.908517][ T1888] 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 1486.957167][ T1911] FAULT_INJECTION: forcing a failure. [ 1486.957167][ T1911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.957193][ T1911] CPU: 1 PID: 1911 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.957222][ T1911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1486.957234][ T1911] Call Trace: 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf803, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1486.957240][ T1911] [ 1486.957265][ T1911] dump_stack_lvl+0xd6/0x122 [ 1486.957292][ T1911] dump_stack+0x11/0x12 [ 1486.957337][ T1911] should_fail+0x242/0x250 [ 1486.957359][ T1911] should_fail_usercopy+0x16/0x20 [ 1486.957381][ T1911] _copy_to_user+0x1a/0x90 [ 1486.957401][ T1911] bpf_verifier_vlog+0x137/0x230 [ 1486.957423][ T1911] __btf_verifier_log+0x80/0xa0 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x17, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1486.957461][ T1918] FAULT_INJECTION: forcing a failure. [ 1486.957461][ T1918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.957467][ T1911] ? btf_parse_hdr+0x2b9/0x460 [ 1486.957488][ T1911] ? check_heap_object+0x1ab/0x3e0 [ 1486.957510][ T1911] btf_parse_hdr+0x2cf/0x460 [ 1486.957528][ T1911] btf_new_fd+0x2af/0x600 [ 1486.957545][ T1911] bpf_btf_load+0x69/0x80 [ 1486.957643][ T1911] __sys_bpf+0x493/0x630 [ 1486.957667][ T1911] __x64_sys_bpf+0x3f/0x50 [ 1486.957737][ T1911] do_syscall_64+0x2b/0x70 [ 1486.957811][ T1911] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.957832][ T1911] RIP: 0033:0x7f5e828fa109 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfa03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x18, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1486.957845][ T1911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x19, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x81) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1486.957860][ T1911] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.957877][ T1911] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1486.957901][ T1911] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.957912][ T1911] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.957923][ T1911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1486.957933][ T1911] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1486.957950][ T1911] [ 1486.957956][ T1918] CPU: 0 PID: 1918 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.957980][ T1918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.957991][ T1918] Call Trace: [ 1486.957996][ T1918] [ 1486.958001][ T1918] dump_stack_lvl+0xd6/0x122 [ 1486.958091][ T1918] dump_stack+0x11/0x12 [ 1486.958113][ T1918] should_fail+0x242/0x250 [ 1486.958170][ T1918] should_fail_usercopy+0x16/0x20 [ 1486.958190][ T1918] _copy_from_user+0x1a/0xc0 [ 1486.958210][ T1918] __sys_bpf+0x1f2/0x630 [ 1486.958314][ T1918] __x64_sys_bpf+0x3f/0x50 14:39:46 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x81) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x1b, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:46 executing program 4: bpf$BPF_BTF_LOAD(0x1c, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:46 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x81) [ 1486.958418][ T1918] do_syscall_64+0x2b/0x70 [ 1486.958435][ T1918] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.958456][ T1918] RIP: 0033:0x7f451a476109 14:39:46 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1486.958471][ T1918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.958531][ T1918] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.958550][ T1918] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1486.958563][ T1918] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.958632][ T1918] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.958645][ T1918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.958658][ T1918] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1486.958674][ T1918] [ 1486.989263][ T1923] FAULT_INJECTION: forcing a failure. [ 1486.989263][ T1923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.989290][ T1923] CPU: 0 PID: 1923 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1486.989341][ T1923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.989352][ T1923] Call Trace: [ 1486.989358][ T1923] [ 1486.989365][ T1923] dump_stack_lvl+0xd6/0x122 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x1d, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x81) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) [ 1486.989391][ T1923] dump_stack+0x11/0x12 [ 1486.989412][ T1923] should_fail+0x242/0x250 [ 1486.989438][ T1923] should_fail_usercopy+0x16/0x20 [ 1486.989463][ T1923] _copy_to_user+0x1a/0x90 [ 1486.989484][ T1923] bpf_verifier_vlog+0x137/0x230 [ 1486.989523][ T1923] __btf_verifier_log+0x80/0xa0 [ 1486.989546][ T1923] ? btf_parse_hdr+0x279/0x460 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x1e, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1486.989567][ T1923] ? check_heap_object+0x1ab/0x3e0 [ 1486.989625][ T1923] btf_parse_hdr+0x28f/0x460 [ 1486.989647][ T1923] btf_new_fd+0x2af/0x600 [ 1486.989744][ T1923] bpf_btf_load+0x69/0x80 [ 1486.989760][ T1923] __sys_bpf+0x493/0x630 [ 1486.989788][ T1923] __x64_sys_bpf+0x3f/0x50 [ 1486.989889][ T1923] do_syscall_64+0x2b/0x70 [ 1486.989913][ T1923] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1486.989937][ T1923] RIP: 0033:0x7f81dcc6b109 [ 1486.989952][ T1923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1486.990045][ T1923] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1486.990066][ T1923] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1486.990080][ T1923] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1486.990093][ T1923] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.990148][ T1923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.990161][ T1923] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1486.990177][ T1923] [ 1487.108440][ T1935] FAULT_INJECTION: forcing a failure. [ 1487.108440][ T1935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.108467][ T1935] CPU: 0 PID: 1935 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.108607][ T1935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.108674][ T1935] Call Trace: [ 1487.108680][ T1935] 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfe03, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x17, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.108686][ T1935] dump_stack_lvl+0xd6/0x122 [ 1487.108716][ T1935] dump_stack+0x11/0x12 [ 1487.108773][ T1935] should_fail+0x242/0x250 [ 1487.108794][ T1935] should_fail_usercopy+0x16/0x20 [ 1487.108815][ T1935] _copy_to_user+0x1a/0x90 [ 1487.108834][ T1935] bpf_verifier_vlog+0x137/0x230 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x25dfdbff}, 0x10}}, 0x8004) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x22, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.108856][ T1935] __btf_verifier_log+0x80/0xa0 [ 1487.108945][ T1935] ? btf_parse_hdr+0x299/0x460 [ 1487.108999][ T1935] ? check_heap_object+0x1ab/0x3e0 [ 1487.109023][ T1935] btf_parse_hdr+0x2af/0x460 [ 1487.109097][ T1931] FAULT_INJECTION: forcing a failure. [ 1487.109097][ T1931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.109108][ T1935] btf_new_fd+0x2af/0x600 [ 1487.109128][ T1935] bpf_btf_load+0x69/0x80 [ 1487.109143][ T1935] __sys_bpf+0x493/0x630 [ 1487.109269][ T1935] __x64_sys_bpf+0x3f/0x50 [ 1487.109289][ T1935] do_syscall_64+0x2b/0x70 [ 1487.109308][ T1935] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.109336][ T1935] RIP: 0033:0x7f81dcc6b109 [ 1487.109348][ T1935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.109364][ T1935] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.109381][ T1935] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0xff8f, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.109392][ T1935] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.109403][ T1935] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.109413][ T1935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.109423][ T1935] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.109518][ T1935] [ 1487.109524][ T1931] CPU: 1 PID: 1931 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.109595][ T1931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0x20010, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.109607][ T1931] Call Trace: [ 1487.109611][ T1931] [ 1487.109618][ T1931] dump_stack_lvl+0xd6/0x122 [ 1487.109642][ T1931] dump_stack+0x11/0x12 [ 1487.109684][ T1931] should_fail+0x242/0x250 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.109704][ T1931] should_fail_usercopy+0x16/0x20 [ 1487.109724][ T1931] _copy_to_user+0x1a/0x90 [ 1487.109743][ T1931] bpf_verifier_vlog+0x137/0x230 [ 1487.109808][ T1931] __btf_verifier_log+0x80/0xa0 [ 1487.109831][ T1931] ? btf_parse_hdr+0x2d9/0x460 [ 1487.109924][ T1931] ? check_heap_object+0x1ab/0x3e0 [ 1487.109948][ T1931] btf_parse_hdr+0x2ef/0x460 [ 1487.109969][ T1931] btf_new_fd+0x2af/0x600 [ 1487.110002][ T1931] bpf_btf_load+0x69/0x80 [ 1487.110123][ T1931] __sys_bpf+0x493/0x630 [ 1487.110226][ T1931] __x64_sys_bpf+0x3f/0x50 [ 1487.110314][ T1931] do_syscall_64+0x2b/0x70 [ 1487.110337][ T1931] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.110362][ T1931] RIP: 0033:0x7f5e828fa109 [ 1487.110377][ T1931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0x31000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x89, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.110398][ T1931] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.110455][ T1931] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.110512][ T1931] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) [ 1487.110525][ T1931] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.110537][ T1931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.110548][ T1931] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.110561][ T1931] [ 1487.147362][ T1941] FAULT_INJECTION: forcing a failure. [ 1487.147362][ T1941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.147390][ T1941] CPU: 1 PID: 1941 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.147415][ T1941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.147426][ T1941] Call Trace: [ 1487.147432][ T1941] [ 1487.147497][ T1941] dump_stack_lvl+0xd6/0x122 [ 1487.147527][ T1941] dump_stack+0x11/0x12 [ 1487.147547][ T1941] should_fail+0x242/0x250 [ 1487.147569][ T1941] should_fail_usercopy+0x16/0x20 [ 1487.147591][ T1941] _copy_to_user+0x1a/0x90 [ 1487.147713][ T1941] bpf_verifier_vlog+0x137/0x230 [ 1487.147794][ T1941] __btf_verifier_log+0x80/0xa0 [ 1487.147817][ T1941] ? btf_parse_hdr+0x2b9/0x460 [ 1487.147838][ T1941] ? check_heap_object+0x1ab/0x3e0 [ 1487.147866][ T1941] btf_parse_hdr+0x2cf/0x460 [ 1487.147922][ T1941] btf_new_fd+0x2af/0x600 [ 1487.147983][ T1941] bpf_btf_load+0x69/0x80 14:39:47 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3ffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:47 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.148003][ T1941] __sys_bpf+0x493/0x630 [ 1487.148092][ T1941] __x64_sys_bpf+0x3f/0x50 [ 1487.148121][ T1941] do_syscall_64+0x2b/0x70 [ 1487.148164][ T1941] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.148188][ T1941] RIP: 0033:0x7f81dcc6b109 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.148202][ T1941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.148221][ T1941] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.148330][ T1941] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1487.148343][ T1941] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.148357][ T1941] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x40000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1c, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.148372][ T1941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.148385][ T1941] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6, 0x1}, 0x20) [ 1487.148403][ T1941] [ 1487.176347][ T1950] FAULT_INJECTION: forcing a failure. [ 1487.176347][ T1950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.176371][ T1950] CPU: 0 PID: 1950 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.176435][ T1950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.176447][ T1950] Call Trace: [ 1487.176452][ T1950] [ 1487.176459][ T1950] dump_stack_lvl+0xd6/0x122 [ 1487.176485][ T1950] dump_stack+0x11/0x12 [ 1487.176507][ T1950] should_fail+0x242/0x250 [ 1487.176527][ T1950] should_fail_usercopy+0x16/0x20 [ 1487.176547][ T1950] _copy_to_user+0x1a/0x90 [ 1487.176595][ T1950] bpf_verifier_vlog+0x137/0x230 [ 1487.176644][ T1950] __btf_verifier_log+0x80/0xa0 [ 1487.176666][ T1950] ? btf_parse_hdr+0x2f9/0x460 [ 1487.176743][ T1950] ? check_heap_object+0x1ab/0x3e0 [ 1487.176769][ T1950] btf_parse_hdr+0x30f/0x460 [ 1487.176792][ T1950] btf_new_fd+0x2af/0x600 [ 1487.176875][ T1950] bpf_btf_load+0x69/0x80 [ 1487.176928][ T1950] __sys_bpf+0x493/0x630 [ 1487.176982][ T1950] __x64_sys_bpf+0x3f/0x50 [ 1487.177008][ T1950] do_syscall_64+0x2b/0x70 [ 1487.177132][ T1950] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.177168][ T1950] RIP: 0033:0x7f5e828fa109 [ 1487.177182][ T1950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.177205][ T1950] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.177225][ T1950] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.177239][ T1950] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.177270][ T1950] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x80000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.177284][ T1950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.177298][ T1950] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.177315][ T1950] [ 1487.367062][ T1959] FAULT_INJECTION: forcing a failure. [ 1487.367062][ T1959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.367089][ T1959] CPU: 0 PID: 1959 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.367123][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.367134][ T1959] Call Trace: [ 1487.367140][ T1959] [ 1487.367146][ T1959] dump_stack_lvl+0xd6/0x122 [ 1487.367239][ T1959] dump_stack+0x11/0x12 [ 1487.367259][ T1959] should_fail+0x242/0x250 [ 1487.367285][ T1959] should_fail_usercopy+0x16/0x20 [ 1487.367336][ T1959] _copy_to_user+0x1a/0x90 [ 1487.367432][ T1959] bpf_verifier_vlog+0x137/0x230 [ 1487.367454][ T1959] __btf_verifier_log+0x80/0xa0 [ 1487.367550][ T1959] ? bpf_verifier_vlog+0x174/0x230 [ 1487.367643][ T1959] ? check_heap_object+0x1ab/0x3e0 [ 1487.367668][ T1959] btf_parse_hdr+0x328/0x460 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x100000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.367713][ T1959] btf_new_fd+0x2af/0x600 [ 1487.367741][ T1959] bpf_btf_load+0x69/0x80 [ 1487.367758][ T1959] __sys_bpf+0x493/0x630 [ 1487.367785][ T1959] __x64_sys_bpf+0x3f/0x50 [ 1487.367809][ T1959] do_syscall_64+0x2b/0x70 [ 1487.367894][ T1959] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.367917][ T1959] RIP: 0033:0x7f5e828fa109 [ 1487.367933][ T1959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x100300, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.368029][ T1959] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.368051][ T1959] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.368065][ T1959] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.368078][ T1959] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.368091][ T1959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.368183][ T1959] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.368201][ T1959] 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1fffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.368449][ T1961] FAULT_INJECTION: forcing a failure. [ 1487.368449][ T1961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.368470][ T1961] CPU: 1 PID: 1961 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.368537][ T1961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.368549][ T1961] Call Trace: 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 3: syz_clone(0xc08ab000, 0x0, 0x100300, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.368554][ T1961] [ 1487.368560][ T1961] dump_stack_lvl+0xd6/0x122 [ 1487.368585][ T1961] dump_stack+0x11/0x12 [ 1487.368655][ T1961] should_fail+0x242/0x250 [ 1487.368676][ T1961] should_fail_usercopy+0x16/0x20 [ 1487.368753][ T1961] _copy_from_user+0x1a/0xc0 [ 1487.368774][ T1961] __sys_bpf+0x1f2/0x630 [ 1487.368848][ T1961] __x64_sys_bpf+0x3f/0x50 [ 1487.368871][ T1961] do_syscall_64+0x2b/0x70 [ 1487.368893][ T1961] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.369027][ T1961] RIP: 0033:0x7fd3d038f109 14:39:48 executing program 2: syz_clone(0xc08ab000, 0x0, 0x400000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x92, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5f, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.369042][ T1961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.369061][ T1961] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:49 executing program 3: syz_clone(0xc08ab000, 0x0, 0x31000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.369081][ T1961] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1487.369094][ T1961] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.369107][ T1961] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.369199][ T1961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe00000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.369212][ T1961] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1487.369298][ T1961] [ 1487.371068][ T1963] FAULT_INJECTION: forcing a failure. [ 1487.371068][ T1963] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.371090][ T1963] CPU: 1 PID: 1963 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x16, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.371180][ T1963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.371249][ T1963] Call Trace: [ 1487.371255][ T1963] [ 1487.371261][ T1963] dump_stack_lvl+0xd6/0x122 [ 1487.371286][ T1963] dump_stack+0x11/0x12 [ 1487.371354][ T1963] should_fail+0x242/0x250 [ 1487.371373][ T1963] should_fail_usercopy+0x16/0x20 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.371393][ T1963] _copy_to_user+0x1a/0x90 [ 1487.371451][ T1963] bpf_verifier_vlog+0x137/0x230 [ 1487.371473][ T1963] __btf_verifier_log+0x80/0xa0 [ 1487.371502][ T1963] ? btf_parse_hdr+0x2d9/0x460 [ 1487.371551][ T1963] ? check_heap_object+0x1ab/0x3e0 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.371647][ T1963] btf_parse_hdr+0x2ef/0x460 [ 1487.371669][ T1963] btf_new_fd+0x2af/0x600 [ 1487.371739][ T1963] bpf_btf_load+0x69/0x80 [ 1487.371826][ T1963] __sys_bpf+0x493/0x630 [ 1487.371856][ T1963] __x64_sys_bpf+0x3f/0x50 [ 1487.371880][ T1963] do_syscall_64+0x2b/0x70 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1487.371903][ T1963] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.371999][ T1963] RIP: 0033:0x7f81dcc6b109 [ 1487.372015][ T1963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.372034][ T1963] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.372054][ T1963] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1487.372067][ T1963] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc5, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.372081][ T1963] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.372095][ T1963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.372108][ T1963] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.372157][ T1963] [ 1487.421881][ T1969] FAULT_INJECTION: forcing a failure. [ 1487.421881][ T1969] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.421907][ T1969] CPU: 0 PID: 1969 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.422012][ T1969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.422023][ T1969] Call Trace: [ 1487.422029][ T1969] [ 1487.422036][ T1969] dump_stack_lvl+0xd6/0x122 [ 1487.422062][ T1969] dump_stack+0x11/0x12 [ 1487.422087][ T1969] should_fail+0x242/0x250 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.422117][ T1969] should_fail_usercopy+0x16/0x20 [ 1487.422150][ T1969] _copy_to_user+0x1a/0x90 [ 1487.422237][ T1969] bpf_verifier_vlog+0x137/0x230 [ 1487.422260][ T1969] __btf_verifier_log+0x80/0xa0 [ 1487.422356][ T1969] ? bpf_verifier_vlog+0x174/0x230 [ 1487.422438][ T1969] ? check_heap_object+0x1ab/0x3e0 [ 1487.422464][ T1969] btf_parse_hdr+0x328/0x460 [ 1487.422484][ T1969] btf_new_fd+0x2af/0x600 [ 1487.422505][ T1969] bpf_btf_load+0x69/0x80 [ 1487.422558][ T1969] __sys_bpf+0x493/0x630 [ 1487.422595][ T1969] __x64_sys_bpf+0x3f/0x50 [ 1487.422620][ T1969] do_syscall_64+0x2b/0x70 [ 1487.422644][ T1969] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x89, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc5, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.422748][ T1969] RIP: 0033:0x7f5e828fa109 [ 1487.422764][ T1969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.422782][ T1969] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc5, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.422801][ T1969] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.422815][ T1969] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.422829][ T1969] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.422842][ T1969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.422856][ T1969] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.422893][ T1969] [ 1487.432710][ T1970] FAULT_INJECTION: forcing a failure. [ 1487.432710][ T1970] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:49 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2e, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1c, 0xc6, 0x1}, 0x20) 14:39:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.432740][ T1970] CPU: 1 PID: 1970 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.432765][ T1970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.432777][ T1970] Call Trace: [ 1487.432783][ T1970] [ 1487.432789][ T1970] dump_stack_lvl+0xd6/0x122 [ 1487.432814][ T1970] dump_stack+0x11/0x12 [ 1487.432835][ T1970] should_fail+0x242/0x250 [ 1487.432899][ T1970] should_fail_usercopy+0x16/0x20 [ 1487.432992][ T1970] _copy_to_user+0x1a/0x90 [ 1487.433012][ T1970] bpf_verifier_vlog+0x137/0x230 [ 1487.433034][ T1970] __btf_verifier_log+0x80/0xa0 [ 1487.433136][ T1970] ? btf_parse_hdr+0x2f9/0x460 [ 1487.433160][ T1970] ? check_heap_object+0x1ab/0x3e0 [ 1487.433186][ T1970] btf_parse_hdr+0x30f/0x460 [ 1487.433207][ T1970] btf_new_fd+0x2af/0x600 [ 1487.433230][ T1970] bpf_btf_load+0x69/0x80 [ 1487.433258][ T1970] __sys_bpf+0x493/0x630 [ 1487.433332][ T1970] __x64_sys_bpf+0x3f/0x50 [ 1487.433356][ T1970] do_syscall_64+0x2b/0x70 14:39:50 executing program 2: syz_clone(0xc08ab000, 0x0, 0x5000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.433378][ T1970] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.433404][ T1970] RIP: 0033:0x7f81dcc6b109 [ 1487.433420][ T1970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.433493][ T1970] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.433514][ T1970] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1b, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.433529][ T1970] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.433542][ T1970] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.433555][ T1970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 1487.433567][ T1970] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.433630][ T1970] [ 1487.436554][ T1976] FAULT_INJECTION: forcing a failure. [ 1487.436554][ T1976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.436577][ T1976] CPU: 1 PID: 1976 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.436662][ T1976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.436673][ T1976] Call Trace: [ 1487.436678][ T1976] [ 1487.436685][ T1976] dump_stack_lvl+0xd6/0x122 [ 1487.436710][ T1976] dump_stack+0x11/0x12 [ 1487.436731][ T1976] should_fail+0x242/0x250 [ 1487.436827][ T1976] should_fail_usercopy+0x16/0x20 [ 1487.436880][ T1976] _copy_from_user+0x1a/0xc0 [ 1487.436900][ T1976] btf_new_fd+0x233/0x600 14:39:50 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.436922][ T1976] bpf_btf_load+0x69/0x80 [ 1487.436940][ T1976] __sys_bpf+0x493/0x630 [ 1487.436991][ T1976] __x64_sys_bpf+0x3f/0x50 [ 1487.437015][ T1976] do_syscall_64+0x2b/0x70 [ 1487.437037][ T1976] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) [ 1487.437105][ T1976] RIP: 0033:0x7f451a476109 [ 1487.437123][ T1976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.437141][ T1976] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.437160][ T1976] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1487.437174][ T1976] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.437187][ T1976] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.437200][ T1976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.437215][ T1976] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.437257][ T1976] [ 1487.534750][ T1983] FAULT_INJECTION: forcing a failure. [ 1487.534750][ T1983] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.534776][ T1983] CPU: 0 PID: 1983 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:50 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6010000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.534800][ T1983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.534813][ T1983] Call Trace: [ 1487.534818][ T1983] [ 1487.534826][ T1983] dump_stack_lvl+0xd6/0x122 [ 1487.534851][ T1983] dump_stack+0x11/0x12 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.534873][ T1983] should_fail+0x242/0x250 [ 1487.534966][ T1983] should_fail_usercopy+0x16/0x20 [ 1487.534987][ T1983] _copy_to_user+0x1a/0x90 [ 1487.535007][ T1983] bpf_verifier_vlog+0x137/0x230 [ 1487.535101][ T1983] btf_verifier_log+0x140/0x170 [ 1487.535127][ T1983] btf_enum_log+0x3b/0x40 [ 1487.535186][ T1983] __btf_verifier_log_type+0x331/0x3f0 [ 1487.535210][ T1983] ? number+0xaa9/0xbe0 [ 1487.535287][ T1983] ? sort_r+0xb4c/0xb60 [ 1487.535306][ T1983] ? btf_enum_check_meta+0x11b/0x7d0 [ 1487.535331][ T1983] btf_enum_check_meta+0x1ea/0x7d0 [ 1487.535354][ T1983] ? check_heap_object+0x1ab/0x3e0 [ 1487.535411][ T1983] btf_check_all_metas+0x232/0x540 [ 1487.535439][ T1983] btf_parse_type_sec+0xba/0xfa0 [ 1487.535464][ T1983] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.535487][ T1983] ? btf_parse_hdr+0x456/0x460 [ 1487.535507][ T1983] btf_new_fd+0x3a3/0x600 [ 1487.535604][ T1983] bpf_btf_load+0x69/0x80 [ 1487.535623][ T1983] __sys_bpf+0x493/0x630 [ 1487.535650][ T1983] __x64_sys_bpf+0x3f/0x50 [ 1487.535724][ T1983] do_syscall_64+0x2b/0x70 [ 1487.535746][ T1983] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.535824][ T1983] RIP: 0033:0x7f5e828fa109 14:39:50 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: syz_clone(0xc08ab000, 0x0, 0x5000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.535839][ T1983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.535857][ T1983] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.535955][ T1983] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.535970][ T1983] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.535983][ T1983] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.535996][ T1983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.536009][ T1983] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.536025][ T1983] [ 1487.537825][ T1985] FAULT_INJECTION: forcing a failure. [ 1487.537825][ T1985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.537848][ T1985] CPU: 0 PID: 1985 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.537910][ T1985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.537922][ T1985] Call Trace: [ 1487.537928][ T1985] [ 1487.537934][ T1985] dump_stack_lvl+0xd6/0x122 [ 1487.537961][ T1985] dump_stack+0x11/0x12 [ 1487.537983][ T1985] should_fail+0x242/0x250 [ 1487.538067][ T1985] should_fail_usercopy+0x16/0x20 [ 1487.538095][ T1985] _copy_to_user+0x1a/0x90 [ 1487.538115][ T1985] bpf_verifier_vlog+0x137/0x230 [ 1487.538136][ T1985] __btf_verifier_log+0x80/0xa0 [ 1487.538213][ T1985] ? btf_parse_hdr+0x211/0x460 [ 1487.538236][ T1985] ? check_heap_object+0x1ab/0x3e0 [ 1487.538262][ T1985] btf_parse_hdr+0x22d/0x460 [ 1487.538283][ T1985] btf_new_fd+0x2af/0x600 [ 1487.538381][ T1985] bpf_btf_load+0x69/0x80 [ 1487.538400][ T1985] __sys_bpf+0x493/0x630 [ 1487.538429][ T1985] __x64_sys_bpf+0x3f/0x50 [ 1487.538453][ T1985] do_syscall_64+0x2b/0x70 [ 1487.538475][ T1985] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.538523][ T1985] RIP: 0033:0x7f451a476109 [ 1487.538538][ T1985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:50 executing program 2: syz_clone(0xc08ab000, 0x0, 0x8000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 3: syz_clone(0xc08ab000, 0x0, 0x6010000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.538558][ T1985] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.538641][ T1985] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 14:39:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.538706][ T1985] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.538720][ T1985] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.538734][ T1985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.538748][ T1985] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.538765][ T1985] [ 1487.542805][ T1987] FAULT_INJECTION: forcing a failure. [ 1487.542805][ T1987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.542827][ T1987] CPU: 0 PID: 1987 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.542851][ T1987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.542863][ T1987] Call Trace: [ 1487.542869][ T1987] [ 1487.542875][ T1987] dump_stack_lvl+0xd6/0x122 [ 1487.542900][ T1987] dump_stack+0x11/0x12 [ 1487.542944][ T1987] should_fail+0x242/0x250 [ 1487.542964][ T1987] should_fail_usercopy+0x16/0x20 [ 1487.542984][ T1987] _copy_to_user+0x1a/0x90 14:39:51 executing program 2: syz_clone(0xc08ab000, 0x0, 0x8020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x92, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.543004][ T1987] bpf_verifier_vlog+0x137/0x230 [ 1487.543026][ T1987] __btf_verifier_log+0x80/0xa0 [ 1487.543049][ T1987] ? bpf_verifier_vlog+0x174/0x230 [ 1487.543083][ T1987] ? check_heap_object+0x1ab/0x3e0 [ 1487.543115][ T1987] btf_parse_hdr+0x328/0x460 [ 1487.543137][ T1987] btf_new_fd+0x2af/0x600 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc5, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.543218][ T1987] bpf_btf_load+0x69/0x80 [ 1487.543236][ T1987] __sys_bpf+0x493/0x630 [ 1487.543264][ T1987] __x64_sys_bpf+0x3f/0x50 [ 1487.543289][ T1987] do_syscall_64+0x2b/0x70 [ 1487.543358][ T1987] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.543387][ T1987] RIP: 0033:0x7f81dcc6b109 [ 1487.543401][ T1987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.543419][ T1987] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.543439][ T1987] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1487.543452][ T1987] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.543465][ T1987] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.543522][ T1987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.543535][ T1987] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.543551][ T1987] [ 1487.578827][ T1994] FAULT_INJECTION: forcing a failure. [ 1487.578827][ T1994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.578853][ T1994] CPU: 0 PID: 1994 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.578927][ T1994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.578938][ T1994] Call Trace: [ 1487.578943][ T1994] [ 1487.578949][ T1994] dump_stack_lvl+0xd6/0x122 [ 1487.578976][ T1994] dump_stack+0x11/0x12 [ 1487.578998][ T1994] should_fail+0x242/0x250 [ 1487.579021][ T1994] should_fail_usercopy+0x16/0x20 [ 1487.579103][ T1994] _copy_to_user+0x1a/0x90 [ 1487.579123][ T1994] bpf_verifier_vlog+0x137/0x230 [ 1487.579145][ T1994] __btf_verifier_log+0x80/0xa0 [ 1487.579216][ T1994] ? put_dec+0xcd/0xe0 [ 1487.579276][ T1994] __btf_verifier_log_type+0x2f6/0x3f0 [ 1487.579301][ T1994] ? number+0xaa9/0xbe0 [ 1487.579320][ T1994] ? sort_r+0xb4c/0xb60 [ 1487.579338][ T1994] ? btf_enum_check_meta+0x11b/0x7d0 [ 1487.579377][ T1994] btf_enum_check_meta+0x1ea/0x7d0 [ 1487.579401][ T1994] ? check_heap_object+0x1ab/0x3e0 [ 1487.579428][ T1994] btf_check_all_metas+0x232/0x540 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 2: syz_clone(0xc08ab000, 0x0, 0x8040000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.579450][ T1994] btf_parse_type_sec+0xba/0xfa0 [ 1487.579475][ T1994] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.579577][ T1994] ? btf_parse_hdr+0x456/0x460 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1487.579598][ T1994] btf_new_fd+0x3a3/0x600 [ 1487.579619][ T1994] bpf_btf_load+0x69/0x80 [ 1487.579684][ T1994] __sys_bpf+0x493/0x630 [ 1487.579711][ T1994] __x64_sys_bpf+0x3f/0x50 [ 1487.579737][ T1994] do_syscall_64+0x2b/0x70 [ 1487.579760][ T1994] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.579854][ T1994] RIP: 0033:0x7f81dcc6b109 [ 1487.579871][ T1994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.579903][ T1994] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.579990][ T1994] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 14:39:51 executing program 2: syz_clone(0xc08ab000, 0x0, 0x9000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x33, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.580003][ T1994] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.580016][ T1994] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.580029][ T1994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.580096][ T1994] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.580114][ T1994] [ 1487.594287][ T1998] FAULT_INJECTION: forcing a failure. [ 1487.594287][ T1998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.594313][ T1998] CPU: 0 PID: 1998 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.594339][ T1998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.594351][ T1998] Call Trace: 14:39:51 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x16, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.594357][ T1998] [ 1487.594363][ T1998] dump_stack_lvl+0xd6/0x122 [ 1487.594407][ T1998] dump_stack+0x11/0x12 [ 1487.594491][ T1998] should_fail+0x242/0x250 [ 1487.594512][ T1998] should_fail_usercopy+0x16/0x20 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.594593][ T1998] _copy_to_user+0x1a/0x90 [ 1487.594613][ T1998] bpf_verifier_vlog+0x137/0x230 [ 1487.594678][ T1998] btf_verifier_log+0x140/0x170 [ 1487.594704][ T1998] btf_enum_log+0x3b/0x40 [ 1487.594727][ T1998] __btf_verifier_log_type+0x331/0x3f0 [ 1487.594823][ T1998] ? sort_r+0xb4c/0xb60 [ 1487.594841][ T1998] ? btf_enum_check_meta+0x11b/0x7d0 [ 1487.594865][ T1998] btf_enum_check_meta+0x1ea/0x7d0 [ 1487.594888][ T1998] ? check_heap_object+0x1ab/0x3e0 [ 1487.594986][ T1998] btf_check_all_metas+0x232/0x540 [ 1487.595009][ T1998] btf_parse_type_sec+0xba/0xfa0 [ 1487.595040][ T1998] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.595063][ T1998] ? btf_parse_hdr+0x456/0x460 14:39:51 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.595090][ T1998] btf_new_fd+0x3a3/0x600 [ 1487.595112][ T1998] bpf_btf_load+0x69/0x80 [ 1487.595131][ T1998] __sys_bpf+0x493/0x630 14:39:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) [ 1487.595191][ T1998] __x64_sys_bpf+0x3f/0x50 [ 1487.595218][ T1998] do_syscall_64+0x2b/0x70 [ 1487.595241][ T1998] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.595310][ T1998] RIP: 0033:0x7f5e828fa109 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.595325][ T1998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.595344][ T1998] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.595365][ T1998] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.595380][ T1998] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x29, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.595406][ T1998] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.595420][ T1998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc010000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x28, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.595433][ T1998] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.595524][ T1998] [ 1487.605223][ T2000] FAULT_INJECTION: forcing a failure. [ 1487.605223][ T2000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.605249][ T2000] CPU: 1 PID: 2000 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.605273][ T2000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.605340][ T2000] Call Trace: [ 1487.605346][ T2000] 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0xd000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.605389][ T2000] dump_stack_lvl+0xd6/0x122 [ 1487.605417][ T2000] dump_stack+0x11/0x12 [ 1487.605436][ T2000] should_fail+0x242/0x250 [ 1487.605457][ T2000] should_fail_usercopy+0x16/0x20 [ 1487.605478][ T2000] _copy_to_user+0x1a/0x90 [ 1487.605565][ T2000] bpf_verifier_vlog+0x137/0x230 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) [ 1487.605592][ T2000] __btf_verifier_log+0x80/0xa0 [ 1487.605663][ T2000] ? btf_parse_hdr+0x237/0x460 [ 1487.605685][ T2000] ? check_heap_object+0x1ab/0x3e0 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x89, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) [ 1487.605712][ T2000] btf_parse_hdr+0x24e/0x460 [ 1487.605797][ T2000] btf_new_fd+0x2af/0x600 [ 1487.605830][ T2000] bpf_btf_load+0x69/0x80 [ 1487.605849][ T2000] __sys_bpf+0x493/0x630 [ 1487.605878][ T2000] __x64_sys_bpf+0x3f/0x50 [ 1487.605944][ T2000] do_syscall_64+0x2b/0x70 [ 1487.606063][ T2000] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.606086][ T2000] RIP: 0033:0x7f451a476109 [ 1487.606102][ T2000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.606122][ T2000] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.606144][ T2000] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1487.606158][ T2000] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.606171][ T2000] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.606220][ T2000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0x10000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.606234][ T2000] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.606252][ T2000] [ 1487.733673][ T2009] FAULT_INJECTION: forcing a failure. [ 1487.733673][ T2009] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.733789][ T2009] CPU: 1 PID: 2009 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.733815][ T2009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.733827][ T2009] Call Trace: [ 1487.733834][ T2009] [ 1487.733841][ T2009] dump_stack_lvl+0xd6/0x122 [ 1487.733892][ T2009] dump_stack+0x11/0x12 [ 1487.733912][ T2009] should_fail+0x242/0x250 [ 1487.734004][ T2009] should_fail_usercopy+0x16/0x20 [ 1487.734027][ T2009] _copy_to_user+0x1a/0x90 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0x10000200, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 3: syz_clone(0xc08ab000, 0x0, 0xd000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.734083][ T2009] bpf_verifier_vlog+0x137/0x230 [ 1487.734107][ T2009] __btf_verifier_log+0x80/0xa0 [ 1487.734213][ T2009] ? btf_parse_hdr+0x258/0x460 [ 1487.734248][ T2009] ? check_heap_object+0x1ab/0x3e0 [ 1487.734350][ T2009] btf_parse_hdr+0x26f/0x460 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.734372][ T2009] btf_new_fd+0x2af/0x600 [ 1487.734444][ T2009] bpf_btf_load+0x69/0x80 [ 1487.734461][ T2009] __sys_bpf+0x493/0x630 [ 1487.734490][ T2009] __x64_sys_bpf+0x3f/0x50 [ 1487.734571][ T2009] do_syscall_64+0x2b/0x70 [ 1487.734594][ T2009] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.734617][ T2009] RIP: 0033:0x7f451a476109 [ 1487.734632][ T2009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.734670][ T2009] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.734691][ T2009] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1487.734703][ T2009] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.734717][ T2009] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.734729][ T2009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.734742][ T2009] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.734758][ T2009] [ 1487.735187][ T2010] FAULT_INJECTION: forcing a failure. [ 1487.735187][ T2010] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.735209][ T2010] CPU: 1 PID: 2010 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.735232][ T2010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.735245][ T2010] Call Trace: [ 1487.735251][ T2010] [ 1487.735334][ T2010] dump_stack_lvl+0xd6/0x122 [ 1487.735359][ T2010] dump_stack+0x11/0x12 [ 1487.735379][ T2010] should_fail+0x242/0x250 14:39:52 executing program 2: syz_clone(0xc08ab000, 0x0, 0x11000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.735399][ T2010] should_fail_usercopy+0x16/0x20 [ 1487.735430][ T2010] _copy_to_user+0x1a/0x90 [ 1487.735452][ T2010] bpf_verifier_vlog+0x137/0x230 [ 1487.735472][ T2010] __btf_verifier_log+0x80/0xa0 [ 1487.735497][ T2010] __btf_verifier_log_type+0x2f6/0x3f0 [ 1487.735529][ T2010] ? number+0xaa9/0xbe0 [ 1487.735590][ T2010] ? sort_r+0xb4c/0xb60 [ 1487.735647][ T2010] ? btf_enum_check_meta+0x3ce/0x7d0 [ 1487.735674][ T2010] btf_enum_check_meta+0x7a4/0x7d0 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.735701][ T2010] btf_check_all_metas+0x232/0x540 [ 1487.735792][ T2010] btf_parse_type_sec+0xba/0xfa0 [ 1487.735816][ T2010] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.735842][ T2010] ? btf_parse_hdr+0x456/0x460 [ 1487.735865][ T2010] btf_new_fd+0x3a3/0x600 [ 1487.735887][ T2010] bpf_btf_load+0x69/0x80 [ 1487.735972][ T2010] __sys_bpf+0x493/0x630 [ 1487.735997][ T2010] __x64_sys_bpf+0x3f/0x50 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.736020][ T2010] do_syscall_64+0x2b/0x70 [ 1487.736042][ T2010] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.736147][ T2010] RIP: 0033:0x7f5e828fa109 [ 1487.736163][ T2010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.736183][ T2010] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.736204][ T2010] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.736218][ T2010] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.736232][ T2010] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.736245][ T2010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:39:53 executing program 2: syz_clone(0xc08ab000, 0x0, 0x12000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.736305][ T2010] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.736323][ T2010] 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.739223][ T2013] FAULT_INJECTION: forcing a failure. [ 1487.739223][ T2013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.739327][ T2013] CPU: 0 PID: 2013 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.739353][ T2013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.739365][ T2013] Call Trace: [ 1487.739371][ T2013] [ 1487.739378][ T2013] dump_stack_lvl+0xd6/0x122 [ 1487.739404][ T2013] dump_stack+0x11/0x12 [ 1487.739429][ T2013] should_fail+0x242/0x250 [ 1487.739464][ T2013] should_fail_usercopy+0x16/0x20 [ 1487.739503][ T2013] _copy_from_user+0x1a/0xc0 [ 1487.739580][ T2013] btf_new_fd+0x233/0x600 14:39:53 executing program 2: syz_clone(0xc08ab000, 0x0, 0x14000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.739603][ T2013] bpf_btf_load+0x69/0x80 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1600, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.739622][ T2013] __sys_bpf+0x493/0x630 [ 1487.739650][ T2013] __x64_sys_bpf+0x3f/0x50 [ 1487.739674][ T2013] do_syscall_64+0x2b/0x70 [ 1487.739711][ T2013] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.739787][ T2013] RIP: 0033:0x7fd3d038f109 [ 1487.739803][ T2013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.739823][ T2013] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.739843][ T2013] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1487.739914][ T2013] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.739929][ T2013] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.739942][ T2013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.740030][ T2013] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1487.740122][ T2013] [ 1487.744934][ T2015] FAULT_INJECTION: forcing a failure. [ 1487.744934][ T2015] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.744959][ T2015] CPU: 1 PID: 2015 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:53 executing program 2: syz_clone(0xc08ab000, 0x0, 0x16000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc500, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.744982][ T2015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.744993][ T2015] Call Trace: [ 1487.744998][ T2015] [ 1487.745004][ T2015] dump_stack_lvl+0xd6/0x122 [ 1487.745051][ T2015] dump_stack+0x11/0x12 [ 1487.745072][ T2015] should_fail+0x242/0x250 [ 1487.745093][ T2015] should_fail_usercopy+0x16/0x20 [ 1487.745122][ T2015] _copy_to_user+0x1a/0x90 [ 1487.745141][ T2015] bpf_verifier_vlog+0x137/0x230 [ 1487.745162][ T2015] btf_verifier_log+0x140/0x170 [ 1487.745187][ T2015] btf_enum_log+0x3b/0x40 [ 1487.745213][ T2015] __btf_verifier_log_type+0x331/0x3f0 [ 1487.745252][ T2015] ? number+0xaa9/0xbe0 [ 1487.745341][ T2015] ? sort_r+0xb4c/0xb60 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x92, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 2: syz_clone(0xc08ab000, 0x0, 0x18000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) [ 1487.745360][ T2015] ? btf_enum_check_meta+0x11b/0x7d0 [ 1487.745386][ T2015] btf_enum_check_meta+0x1ea/0x7d0 [ 1487.745412][ T2015] btf_check_all_metas+0x232/0x540 [ 1487.745495][ T2015] btf_parse_type_sec+0xba/0xfa0 [ 1487.745519][ T2015] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.745598][ T2015] ? btf_parse_hdr+0x456/0x460 [ 1487.745619][ T2015] btf_new_fd+0x3a3/0x600 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.745641][ T2015] bpf_btf_load+0x69/0x80 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1d, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.745672][ T2015] __sys_bpf+0x493/0x630 [ 1487.745769][ T2015] __x64_sys_bpf+0x3f/0x50 [ 1487.745789][ T2015] do_syscall_64+0x2b/0x70 [ 1487.745806][ T2015] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.745838][ T2015] RIP: 0033:0x7f81dcc6b109 [ 1487.745852][ T2015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.745871][ T2015] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.745890][ T2015] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1487.745904][ T2015] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.745918][ T2015] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.745945][ T2015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.745958][ T2015] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 14:39:53 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1a000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1c, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.745975][ T2015] [ 1487.782258][ T2021] FAULT_INJECTION: forcing a failure. [ 1487.782258][ T2021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.782286][ T2021] CPU: 1 PID: 2021 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.782311][ T2021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc500, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6, 0x1}, 0x20) 14:39:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.782324][ T2021] Call Trace: [ 1487.782330][ T2021] [ 1487.782337][ T2021] dump_stack_lvl+0xd6/0x122 [ 1487.782389][ T2021] dump_stack+0x11/0x12 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8900, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc500, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.782447][ T2021] should_fail+0x242/0x250 [ 1487.782470][ T2021] should_fail_usercopy+0x16/0x20 [ 1487.782542][ T2021] _copy_to_user+0x1a/0x90 [ 1487.782563][ T2021] bpf_verifier_vlog+0x137/0x230 [ 1487.782605][ T2021] __btf_verifier_log+0x80/0xa0 [ 1487.782629][ T2021] ? btf_parse_hdr+0x211/0x460 [ 1487.782700][ T2021] ? check_heap_object+0x1ab/0x3e0 [ 1487.782804][ T2021] btf_parse_hdr+0x22d/0x460 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.782839][ T2021] btf_new_fd+0x2af/0x600 [ 1487.782862][ T2021] bpf_btf_load+0x69/0x80 [ 1487.782880][ T2021] __sys_bpf+0x493/0x630 [ 1487.783029][ T2021] __x64_sys_bpf+0x3f/0x50 [ 1487.783126][ T2021] do_syscall_64+0x2b/0x70 [ 1487.783148][ T2021] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.783172][ T2021] RIP: 0033:0x7fd3d038f109 [ 1487.783189][ T2021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.783288][ T2021] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.783309][ T2021] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1487.783338][ T2021] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.783352][ T2021] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.783365][ T2021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.783378][ T2021] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1487.783395][ T2021] [ 1487.798500][ T2026] FAULT_INJECTION: forcing a failure. 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.798500][ T2026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.798574][ T2026] CPU: 1 PID: 2026 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.798597][ T2026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.798610][ T2026] Call Trace: [ 1487.798616][ T2026] [ 1487.798622][ T2026] dump_stack_lvl+0xd6/0x122 [ 1487.798635][ T2024] FAULT_INJECTION: forcing a failure. [ 1487.798635][ T2024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.798649][ T2026] dump_stack+0x11/0x12 [ 1487.798755][ T2026] should_fail+0x242/0x250 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1d020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.798818][ T2026] should_fail_usercopy+0x16/0x20 [ 1487.798835][ T2026] _copy_to_user+0x1a/0x90 [ 1487.798852][ T2026] bpf_verifier_vlog+0x137/0x230 [ 1487.798908][ T2026] btf_verifier_log+0x140/0x170 [ 1487.798929][ T2026] btf_enum_log+0x3b/0x40 [ 1487.798948][ T2026] __btf_verifier_log_type+0x331/0x3f0 [ 1487.798968][ T2026] ? number+0xaa9/0xbe0 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, 0x0, 0x1b, 0x0, 0x1}, 0x20) [ 1487.799021][ T2026] ? sort_r+0xb4c/0xb60 [ 1487.799036][ T2026] ? btf_enum_check_meta+0x11b/0x7d0 [ 1487.799057][ T2026] btf_enum_check_meta+0x1ea/0x7d0 [ 1487.799076][ T2026] ? check_heap_object+0x1ab/0x3e0 [ 1487.799149][ T2026] btf_check_all_metas+0x232/0x540 [ 1487.799201][ T2026] btf_parse_type_sec+0xba/0xfa0 [ 1487.799222][ T2026] ? btf_check_sec_info+0x1bf/0x1e0 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1e000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6}, 0x20) 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.799242][ T2026] ? btf_parse_hdr+0x456/0x460 [ 1487.799259][ T2026] btf_new_fd+0x3a3/0x600 [ 1487.799341][ T2026] bpf_btf_load+0x69/0x80 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.799356][ T2026] __sys_bpf+0x493/0x630 14:39:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x1b, 0xc6}, 0x20) [ 1487.799379][ T2026] __x64_sys_bpf+0x3f/0x50 [ 1487.799443][ T2026] do_syscall_64+0x2b/0x70 [ 1487.799462][ T2026] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.799481][ T2026] RIP: 0033:0x7f81dcc6b109 [ 1487.799494][ T2026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.799509][ T2026] RSP: 002b:00007f81dc3e1168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.799525][ T2026] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc6b109 [ 1487.799611][ T2026] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1f000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: syz_clone(0xc08ab000, 0x0, 0x1d020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.799646][ T2026] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.799657][ T2026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.799668][ T2026] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1487.799752][ T2026] [ 1487.799758][ T2024] CPU: 0 PID: 2024 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.799821][ T2024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.799832][ T2024] Call Trace: [ 1487.799837][ T2024] [ 1487.799843][ T2024] dump_stack_lvl+0xd6/0x122 [ 1487.799865][ T2024] dump_stack+0x11/0x12 [ 1487.799884][ T2024] should_fail+0x242/0x250 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 3: syz_clone(0xc08ab000, 0x0, 0x1d020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.799916][ T2024] should_fail_usercopy+0x16/0x20 [ 1487.799934][ T2024] _copy_to_user+0x1a/0x90 [ 1487.799952][ T2024] bpf_verifier_vlog+0x137/0x230 [ 1487.799972][ T2024] __btf_verifier_log+0x80/0xa0 14:39:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.799993][ T2024] ? btf_parse_hdr+0x279/0x460 [ 1487.800013][ T2024] ? check_heap_object+0x1ab/0x3e0 [ 1487.800074][ T2024] btf_parse_hdr+0x28f/0x460 [ 1487.800172][ T2024] btf_new_fd+0x2af/0x600 [ 1487.800191][ T2024] bpf_btf_load+0x69/0x80 [ 1487.800208][ T2024] __sys_bpf+0x493/0x630 [ 1487.800236][ T2024] __x64_sys_bpf+0x3f/0x50 [ 1487.800325][ T2024] do_syscall_64+0x2b/0x70 [ 1487.800348][ T2024] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.800407][ T2024] RIP: 0033:0x7f451a476109 [ 1487.800421][ T2024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:54 executing program 2: syz_clone(0xc08ab000, 0x0, 0x20000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.800441][ T2024] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.800520][ T2024] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1487.800534][ T2024] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.800548][ T2024] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.800562][ T2024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:39:55 executing program 3: syz_clone(0xc08ab000, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x16000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.800575][ T2024] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.800657][ T2024] [ 1487.815577][ T2028] FAULT_INJECTION: forcing a failure. [ 1487.815577][ T2028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.815601][ T2028] CPU: 0 PID: 2028 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.815689][ T2028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.815701][ T2028] Call Trace: [ 1487.815707][ T2028] [ 1487.815715][ T2028] dump_stack_lvl+0xd6/0x122 14:39:55 executing program 2: syz_clone(0xc08ab000, 0x0, 0x22000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.815811][ T2028] dump_stack+0x11/0x12 [ 1487.815832][ T2028] should_fail+0x242/0x250 [ 1487.815854][ T2028] should_fail_usercopy+0x16/0x20 [ 1487.815875][ T2028] _copy_to_user+0x1a/0x90 [ 1487.815896][ T2028] bpf_verifier_vlog+0x137/0x230 [ 1487.815917][ T2028] btf_verifier_log+0x140/0x170 [ 1487.815969][ T2028] btf_enum_log+0x3b/0x40 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5f000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.815994][ T2028] __btf_verifier_log_type+0x331/0x3f0 [ 1487.816028][ T2028] ? number+0xaa9/0xbe0 [ 1487.816096][ T2028] ? sort_r+0xb4c/0xb60 [ 1487.816184][ T2028] ? btf_enum_check_meta+0x3ce/0x7d0 [ 1487.816211][ T2028] btf_enum_check_meta+0x7a4/0x7d0 [ 1487.816238][ T2028] btf_check_all_metas+0x232/0x540 [ 1487.816262][ T2028] btf_parse_type_sec+0xba/0xfa0 14:39:55 executing program 2: syz_clone(0xc08ab000, 0x0, 0x24000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9200, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.816349][ T2028] ? btf_check_sec_info+0x1bf/0x1e0 [ 1487.816373][ T2028] ? btf_parse_hdr+0x456/0x460 [ 1487.816395][ T2028] btf_new_fd+0x3a3/0x600 [ 1487.816416][ T2028] bpf_btf_load+0x69/0x80 [ 1487.816435][ T2028] __sys_bpf+0x493/0x630 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc500, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.816480][ T2028] __x64_sys_bpf+0x3f/0x50 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1487.816561][ T2028] do_syscall_64+0x2b/0x70 [ 1487.816668][ T2028] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.816692][ T2028] RIP: 0033:0x7f5e828fa109 [ 1487.816709][ T2028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.816729][ T2028] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.816770][ T2028] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1487.816784][ T2028] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:55 executing program 2: syz_clone(0xc08ab000, 0x0, 0x26000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.816797][ T2028] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.816812][ T2028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1487.816851][ T2028] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.816868][ T2028] [ 1487.829116][ T2030] FAULT_INJECTION: forcing a failure. [ 1487.829116][ T2030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.829144][ T2030] CPU: 0 PID: 2030 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.829191][ T2030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.829203][ T2030] Call Trace: [ 1487.829209][ T2030] [ 1487.829215][ T2030] dump_stack_lvl+0xd6/0x122 [ 1487.829241][ T2030] dump_stack+0x11/0x12 [ 1487.829264][ T2030] should_fail+0x242/0x250 [ 1487.829314][ T2030] should_fail_usercopy+0x16/0x20 [ 1487.829335][ T2030] _copy_to_user+0x1a/0x90 [ 1487.829422][ T2030] bpf_verifier_vlog+0x137/0x230 [ 1487.829462][ T2030] __btf_verifier_log+0x80/0xa0 [ 1487.829509][ T2030] ? btf_parse_hdr+0x237/0x460 [ 1487.829531][ T2030] ? check_heap_object+0x1ab/0x3e0 [ 1487.829557][ T2030] btf_parse_hdr+0x24e/0x460 [ 1487.829630][ T2030] btf_new_fd+0x2af/0x600 [ 1487.829702][ T2030] bpf_btf_load+0x69/0x80 [ 1487.829720][ T2030] __sys_bpf+0x493/0x630 [ 1487.829757][ T2030] __x64_sys_bpf+0x3f/0x50 [ 1487.829783][ T2030] do_syscall_64+0x2b/0x70 [ 1487.829886][ T2030] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.829910][ T2030] RIP: 0033:0x7fd3d038f109 [ 1487.829926][ T2030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.829951][ T2030] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.829970][ T2030] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1487.830011][ T2030] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.830028][ T2030] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 14:39:55 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2d020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5000000, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5000000, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.830042][ T2030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.830055][ T2030] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1487.830071][ T2030] [ 1487.977418][ T2038] FAULT_INJECTION: forcing a failure. [ 1487.977418][ T2038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.977481][ T2038] CPU: 1 PID: 2038 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1487.977581][ T2038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.977593][ T2038] Call Trace: [ 1487.977601][ T2038] [ 1487.977609][ T2038] dump_stack_lvl+0xd6/0x122 [ 1487.977636][ T2038] dump_stack+0x11/0x12 [ 1487.977656][ T2038] should_fail+0x242/0x250 [ 1487.977677][ T2038] should_fail_usercopy+0x16/0x20 [ 1487.977730][ T2038] _copy_to_user+0x1a/0x90 [ 1487.977756][ T2038] bpf_verifier_vlog+0x137/0x230 14:39:55 executing program 2: syz_clone(0xc08ab000, 0x0, 0x30020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.977779][ T2038] __btf_verifier_log+0x80/0xa0 [ 1487.977803][ T2038] ? btf_parse_hdr+0x258/0x460 [ 1487.977824][ T2038] ? check_heap_object+0x1ab/0x3e0 [ 1487.977849][ T2038] btf_parse_hdr+0x26f/0x460 [ 1487.977915][ T2038] btf_new_fd+0x2af/0x600 [ 1487.977934][ T2038] bpf_btf_load+0x69/0x80 [ 1487.977951][ T2038] __sys_bpf+0x493/0x630 [ 1487.977975][ T2038] __x64_sys_bpf+0x3f/0x50 14:39:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x16, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 1487.978015][ T2038] do_syscall_64+0x2b/0x70 14:39:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.978036][ T2038] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.978059][ T2038] RIP: 0033:0x7fd3d038f109 [ 1487.978083][ T2038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.978104][ T2038] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.978197][ T2038] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1487.978213][ T2038] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.978227][ T2038] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.978241][ T2038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x35000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xa, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.978255][ T2038] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1487.978271][ T2038] [ 1487.978582][ T2039] FAULT_INJECTION: forcing a failure. [ 1487.978582][ T2039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.978602][ T2039] CPU: 1 PID: 2039 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x89000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.978626][ T2039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.978711][ T2039] Call Trace: [ 1487.978716][ T2039] [ 1487.978722][ T2039] dump_stack_lvl+0xd6/0x122 [ 1487.978746][ T2039] dump_stack+0x11/0x12 [ 1487.978767][ T2039] should_fail+0x242/0x250 [ 1487.978843][ T2039] should_fail_usercopy+0x16/0x20 [ 1487.978923][ T2039] _copy_to_user+0x1a/0x90 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x38000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xa, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5000000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xc, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x16, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xc, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.978944][ T2039] bpf_verifier_vlog+0x137/0x230 [ 1487.979014][ T2039] __btf_verifier_log+0x80/0xa0 [ 1487.979082][ T2039] ? btf_parse_hdr+0x299/0x460 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) [ 1487.979103][ T2039] ? check_heap_object+0x1ab/0x3e0 [ 1487.979128][ T2039] btf_parse_hdr+0x2af/0x460 [ 1487.979151][ T2039] btf_new_fd+0x2af/0x600 [ 1487.979234][ T2039] bpf_btf_load+0x69/0x80 [ 1487.979251][ T2039] __sys_bpf+0x493/0x630 [ 1487.979279][ T2039] __x64_sys_bpf+0x3f/0x50 [ 1487.979339][ T2039] do_syscall_64+0x2b/0x70 [ 1487.979362][ T2039] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.979387][ T2039] RIP: 0033:0x7f451a476109 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3a000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x1a, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x5f5e0ff, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1487.979401][ T2039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.979419][ T2039] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.979447][ T2039] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1487.979460][ T2039] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.979474][ T2039] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.979490][ T2039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.979535][ T2039] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1487.979551][ T2039] [ 1487.982148][ T2040] FAULT_INJECTION: forcing a failure. [ 1487.982148][ T2040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.982170][ T2040] CPU: 0 PID: 2040 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3f000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x5f5e0ff, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.982193][ T2040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1487.982204][ T2040] Call Trace: 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3fe, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1487.982209][ T2040] 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1487.982216][ T2040] dump_stack_lvl+0xd6/0x122 [ 1487.982242][ T2040] dump_stack+0x11/0x12 [ 1487.982311][ T2040] should_fail+0x242/0x250 [ 1487.982332][ T2040] should_fail_usercopy+0x16/0x20 [ 1487.982352][ T2040] _copy_to_user+0x1a/0x90 [ 1487.982372][ T2040] bpf_verifier_vlog+0x137/0x230 [ 1487.982456][ T2040] __btf_verifier_log+0x80/0xa0 [ 1487.982480][ T2040] ? __btf_verifier_log_type+0x34b/0x3f0 [ 1487.982572][ T2040] __btf_verifier_log_type+0x365/0x3f0 [ 1487.982654][ T2040] ? number+0xaa9/0xbe0 [ 1487.982673][ T2040] ? sort_r+0xb4c/0xb60 [ 1487.982692][ T2040] ? btf_enum_check_meta+0x3ce/0x7d0 [ 1487.982741][ T2040] btf_enum_check_meta+0x7a4/0x7d0 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x40000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3fa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x95, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1487.982766][ T2040] btf_check_all_metas+0x232/0x540 [ 1487.982812][ T2040] btf_parse_type_sec+0xba/0xfa0 [ 1487.982857][ T2040] ? btf_check_sec_info+0x1bf/0x1e0 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.982881][ T2040] ? btf_parse_hdr+0x456/0x460 [ 1487.982902][ T2040] btf_new_fd+0x3a3/0x600 [ 1487.982941][ T2040] bpf_btf_load+0x69/0x80 [ 1487.982958][ T2040] __sys_bpf+0x493/0x630 [ 1487.982985][ T2040] __x64_sys_bpf+0x3f/0x50 [ 1487.983090][ T2040] do_syscall_64+0x2b/0x70 [ 1487.983114][ T2040] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1487.983136][ T2040] RIP: 0033:0x7f5e828fa109 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x41000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa1, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.983214][ T2040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1487.983234][ T2040] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1487.983253][ T2040] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1487.983266][ T2040] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1487.983279][ T2040] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1487.983292][ T2040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1487.983306][ T2040] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1487.983350][ T2040] 14:39:56 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4a000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1b000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.038881][ T2052] FAULT_INJECTION: forcing a failure. [ 1488.038881][ T2052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.038907][ T2052] CPU: 0 PID: 2052 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.038954][ T2052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.038965][ T2052] Call Trace: [ 1488.038970][ T2052] 14:39:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x9, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.038976][ T2052] dump_stack_lvl+0xd6/0x122 [ 1488.039003][ T2052] dump_stack+0x11/0x12 [ 1488.039023][ T2052] should_fail+0x242/0x250 [ 1488.039044][ T2052] should_fail_usercopy+0x16/0x20 [ 1488.039115][ T2052] _copy_to_user+0x1a/0x90 [ 1488.039135][ T2052] bpf_verifier_vlog+0x137/0x230 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x67000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.039159][ T2052] __btf_verifier_log+0x80/0xa0 [ 1488.039182][ T2052] ? btf_parse_hdr+0x279/0x460 [ 1488.039203][ T2052] ? check_heap_object+0x1ab/0x3e0 [ 1488.039293][ T2052] btf_parse_hdr+0x28f/0x460 [ 1488.039392][ T2052] btf_new_fd+0x2af/0x600 [ 1488.039442][ T2052] bpf_btf_load+0x69/0x80 [ 1488.039459][ T2052] __sys_bpf+0x493/0x630 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x7c, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.039498][ T2052] __x64_sys_bpf+0x3f/0x50 [ 1488.039598][ T2052] do_syscall_64+0x2b/0x70 [ 1488.039679][ T2052] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.039811][ T2052] RIP: 0033:0x7fd3d038f109 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x68020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x95, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.039826][ T2052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.039897][ T2052] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.039918][ T2052] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.039931][ T2052] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.039944][ T2052] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa1, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xe, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.039957][ T2052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1488.039970][ T2052] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6d030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x9, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x10, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.039986][ T2052] [ 1488.042489][ T2053] FAULT_INJECTION: forcing a failure. [ 1488.042489][ T2053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.042512][ T2053] CPU: 1 PID: 2053 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.042577][ T2053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.042590][ T2053] Call Trace: 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x11, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.042596][ T2053] 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.042602][ T2053] dump_stack_lvl+0xd6/0x122 [ 1488.042790][ T2053] dump_stack+0x11/0x12 [ 1488.042812][ T2053] should_fail+0x242/0x250 [ 1488.042832][ T2053] should_fail_usercopy+0x16/0x20 [ 1488.042851][ T2053] _copy_to_user+0x1a/0x90 [ 1488.042870][ T2053] bpf_verifier_vlog+0x137/0x230 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x75010000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x12, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3fe, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.042981][ T2053] __btf_verifier_log_type+0x39a/0x3f0 [ 1488.043006][ T2053] ? number+0xaa9/0xbe0 [ 1488.043027][ T2053] ? sort_r+0xb4c/0xb60 [ 1488.043046][ T2053] ? btf_enum_check_meta+0x3ce/0x7d0 [ 1488.043107][ T2053] btf_enum_check_meta+0x7a4/0x7d0 [ 1488.043112][ T2054] FAULT_INJECTION: forcing a failure. [ 1488.043112][ T2054] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x1001, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x16, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) [ 1488.043135][ T2053] btf_check_all_metas+0x232/0x540 [ 1488.043154][ T2053] btf_parse_type_sec+0xba/0xfa0 [ 1488.043175][ T2053] ? btf_check_sec_info+0x1bf/0x1e0 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x75020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x25, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x92000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc5000000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) [ 1488.043230][ T2053] ? btf_parse_hdr+0x456/0x460 [ 1488.043257][ T2053] btf_new_fd+0x3a3/0x600 [ 1488.043275][ T2053] bpf_btf_load+0x69/0x80 [ 1488.043369][ T2053] __sys_bpf+0x493/0x630 [ 1488.043461][ T2053] __x64_sys_bpf+0x3f/0x50 [ 1488.043481][ T2053] do_syscall_64+0x2b/0x70 [ 1488.043500][ T2053] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.043519][ T2053] RIP: 0033:0x7f5e828fa109 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xe, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x10, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.043591][ T2053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.043606][ T2053] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.043623][ T2053] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1488.043634][ T2053] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.043645][ T2053] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.043655][ T2053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7a020000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x48, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x3}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x11, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x12, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.043683][ T2053] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1488.043752][ T2053] [ 1488.043758][ T2054] CPU: 0 PID: 2054 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.043780][ T2054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.043819][ T2054] Call Trace: [ 1488.043825][ T2054] [ 1488.043830][ T2054] dump_stack_lvl+0xd6/0x122 [ 1488.043855][ T2054] dump_stack+0x11/0x12 [ 1488.043876][ T2054] should_fail+0x242/0x250 [ 1488.043895][ T2054] should_fail_usercopy+0x16/0x20 [ 1488.043916][ T2054] _copy_to_user+0x1a/0x90 14:39:57 executing program 2: syz_clone(0xc08ab000, 0x0, 0x99030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1a, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x68, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x25, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1488.043994][ T2054] bpf_verifier_vlog+0x137/0x230 [ 1488.044014][ T2054] __btf_verifier_log+0x80/0xa0 [ 1488.044045][ T2054] ? btf_parse_hdr+0x299/0x460 [ 1488.044066][ T2054] ? check_heap_object+0x1ab/0x3e0 14:39:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1488.044091][ T2054] btf_parse_hdr+0x2af/0x460 [ 1488.044118][ T2054] btf_new_fd+0x2af/0x600 [ 1488.044160][ T2054] bpf_btf_load+0x69/0x80 [ 1488.044177][ T2054] __sys_bpf+0x493/0x630 [ 1488.044213][ T2054] __x64_sys_bpf+0x3f/0x50 [ 1488.044256][ T2054] do_syscall_64+0x2b/0x70 [ 1488.044273][ T2054] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.044292][ T2054] RIP: 0033:0x7f451a476109 14:39:58 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa1050000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1b, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x74, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x48, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) [ 1488.044308][ T2054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.044326][ T2054] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.044345][ T2054] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.044392][ T2054] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7a, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x8}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.044405][ T2054] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.044418][ T2054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.044478][ T2054] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.044496][ T2054] [ 1488.122107][ T2065] FAULT_INJECTION: forcing a failure. [ 1488.122107][ T2065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.122239][ T2065] CPU: 0 PID: 2065 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.122261][ T2065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.122271][ T2065] Call Trace: [ 1488.122275][ T2065] [ 1488.122282][ T2065] dump_stack_lvl+0xd6/0x122 [ 1488.122357][ T2065] dump_stack+0x11/0x12 [ 1488.122373][ T2065] should_fail+0x242/0x250 [ 1488.122391][ T2065] should_fail_usercopy+0x16/0x20 [ 1488.122410][ T2065] _copy_to_user+0x1a/0x90 [ 1488.122429][ T2065] bpf_verifier_vlog+0x137/0x230 14:39:58 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa2000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x5f, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xa}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xa, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x68, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) [ 1488.122468][ T2065] __btf_verifier_log+0x80/0xa0 [ 1488.122490][ T2065] ? btf_parse_hdr+0x299/0x460 [ 1488.122511][ T2065] ? check_heap_object+0x1ab/0x3e0 [ 1488.122537][ T2065] btf_parse_hdr+0x2af/0x460 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x300, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xb}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.122566][ T2065] btf_new_fd+0x2af/0x600 [ 1488.122643][ T2065] bpf_btf_load+0x69/0x80 [ 1488.122661][ T2065] __sys_bpf+0x493/0x630 [ 1488.122689][ T2065] __x64_sys_bpf+0x3f/0x50 [ 1488.122792][ T2065] do_syscall_64+0x2b/0x70 [ 1488.122820][ T2065] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.122844][ T2065] RIP: 0033:0x7fd3d038f109 [ 1488.122859][ T2065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:58 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa7ffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0xc, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x600, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xd}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x1b, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x700, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x74, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) [ 1488.122877][ T2065] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.122955][ T2065] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.122968][ T2065] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.122983][ T2065] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x64, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.123047][ T2065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.123059][ T2065] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.123076][ T2065] [ 1488.132498][ T2068] FAULT_INJECTION: forcing a failure. [ 1488.132498][ T2068] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:58 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb9010000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7a, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xe}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x900, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x5f5e0ff, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xa00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.132524][ T2068] CPU: 1 PID: 2068 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.132548][ T2068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.132559][ T2068] Call Trace: [ 1488.132564][ T2068] [ 1488.132571][ T2068] dump_stack_lvl+0xd6/0x122 [ 1488.132634][ T2068] dump_stack+0x11/0x12 [ 1488.132653][ T2068] should_fail+0x242/0x250 [ 1488.132671][ T2068] should_fail_usercopy+0x16/0x20 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x10}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.132734][ T2068] _copy_to_user+0x1a/0x90 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x300, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.132754][ T2068] bpf_verifier_vlog+0x137/0x230 [ 1488.132775][ T2068] __btf_verifier_log+0x80/0xa0 [ 1488.132800][ T2068] ? bpf_verifier_vlog+0x174/0x230 [ 1488.132820][ T2068] ? bpf_verifier_vlog+0x174/0x230 [ 1488.132840][ T2068] __btf_verifier_log_type+0x3c3/0x3f0 [ 1488.132903][ T2068] ? number+0xaa9/0xbe0 [ 1488.132936][ T2068] ? sort_r+0xb4c/0xb60 [ 1488.132954][ T2068] ? btf_enum_check_meta+0x3ce/0x7d0 [ 1488.132979][ T2068] btf_enum_check_meta+0x7a4/0x7d0 [ 1488.133072][ T2068] btf_check_all_metas+0x232/0x540 [ 1488.133096][ T2068] btf_parse_type_sec+0xba/0xfa0 [ 1488.133120][ T2068] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.133159][ T2068] ? btf_parse_hdr+0x456/0x460 14:39:58 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc2000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x11}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xb00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x600, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x36, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.133249][ T2068] btf_new_fd+0x3a3/0x600 [ 1488.133330][ T2068] bpf_btf_load+0x69/0x80 [ 1488.133348][ T2068] __sys_bpf+0x493/0x630 [ 1488.133408][ T2068] __x64_sys_bpf+0x3f/0x50 [ 1488.133472][ T2068] do_syscall_64+0x2b/0x70 [ 1488.133494][ T2068] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.133517][ T2068] RIP: 0033:0x7f5e828fa109 14:39:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x700, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.133561][ T2068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.133580][ T2068] RSP: 002b:00007f5e82070168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.133603][ T2068] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828fa109 [ 1488.133616][ T2068] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.133630][ T2068] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.133643][ T2068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.133655][ T2068] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 [ 1488.133681][ T2068] [ 1488.139163][ T2069] FAULT_INJECTION: forcing a failure. [ 1488.139163][ T2069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.139187][ T2069] CPU: 1 PID: 2069 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.139273][ T2069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.139285][ T2069] Call Trace: [ 1488.139290][ T2069] [ 1488.139297][ T2069] dump_stack_lvl+0xd6/0x122 [ 1488.139324][ T2069] dump_stack+0x11/0x12 [ 1488.139366][ T2069] should_fail+0x242/0x250 [ 1488.139388][ T2069] should_fail_usercopy+0x16/0x20 [ 1488.139410][ T2069] _copy_to_user+0x1a/0x90 [ 1488.139429][ T2069] bpf_verifier_vlog+0x137/0x230 [ 1488.139450][ T2069] __btf_verifier_log+0x80/0xa0 [ 1488.139481][ T2069] ? btf_parse_hdr+0x2d9/0x460 [ 1488.139502][ T2069] ? check_heap_object+0x1ab/0x3e0 [ 1488.139527][ T2069] btf_parse_hdr+0x2ef/0x460 [ 1488.139549][ T2069] btf_new_fd+0x2af/0x600 [ 1488.139568][ T2069] bpf_btf_load+0x69/0x80 [ 1488.139662][ T2069] __sys_bpf+0x493/0x630 [ 1488.139741][ T2069] __x64_sys_bpf+0x3f/0x50 [ 1488.139765][ T2069] do_syscall_64+0x2b/0x70 [ 1488.139804][ T2069] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.139827][ T2069] RIP: 0033:0x7f451a476109 [ 1488.139841][ T2069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc6050000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x900, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xd00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x25}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xe00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xa00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.139859][ T2069] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.139878][ T2069] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.139970][ T2069] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.139984][ T2069] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.139997][ T2069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.140010][ T2069] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x43}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1488.140026][ T2069] [ 1488.177383][ T2078] FAULT_INJECTION: forcing a failure. [ 1488.177383][ T2078] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1488.177408][ T2078] CPU: 1 PID: 2078 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.177432][ T2078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.177506][ T2078] Call Trace: [ 1488.177512][ T2078] [ 1488.177518][ T2078] dump_stack_lvl+0xd6/0x122 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc7050000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xb00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x48}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x1100, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x1200, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.177544][ T2078] dump_stack+0x11/0x12 [ 1488.177564][ T2078] should_fail+0x242/0x250 [ 1488.177629][ T2078] should_fail_usercopy+0x16/0x20 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) [ 1488.177648][ T2078] _copy_to_user+0x1a/0x90 [ 1488.177677][ T2078] simple_read_from_buffer+0xab/0x120 [ 1488.177700][ T2078] proc_fail_nth_read+0x10d/0x150 [ 1488.177747][ T2078] ? proc_fault_inject_write+0x230/0x230 [ 1488.177770][ T2078] vfs_read+0x1a1/0x6a0 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xda030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xd00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x1600, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x68}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.177859][ T2078] ? __fget_files+0x1d2/0x210 [ 1488.177880][ T2078] ksys_read+0xe8/0x1a0 [ 1488.177900][ T2078] __x64_sys_read+0x3e/0x50 [ 1488.177920][ T2078] do_syscall_64+0x2b/0x70 [ 1488.178011][ T2078] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xe00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.178035][ T2078] RIP: 0033:0x7f5e828accbc [ 1488.178054][ T2078] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1488.178072][ T2078] RSP: 002b:00007f5e82070160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1488.178093][ T2078] RAX: ffffffffffffffda RBX: 00007f5e82a0cf60 RCX: 00007f5e828accbc [ 1488.178142][ T2078] RDX: 000000000000000f RSI: 00007f5e820701e0 RDI: 0000000000000003 [ 1488.178155][ T2078] RBP: 00007f5e820701d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.178168][ T2078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.178182][ T2078] R13: 00007ffc319177af R14: 00007f5e82070300 R15: 0000000000022000 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x74}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1100, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xdc030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) [ 1488.178214][ T2078] [ 1488.182921][ T2079] FAULT_INJECTION: forcing a failure. [ 1488.182921][ T2079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.182944][ T2079] CPU: 1 PID: 2079 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.182969][ T2079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.182980][ T2079] Call Trace: 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1200, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7a}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.182986][ T2079] [ 1488.182993][ T2079] dump_stack_lvl+0xd6/0x122 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1a00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x9, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x89}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1488.183019][ T2079] dump_stack+0x11/0x12 [ 1488.183058][ T2079] should_fail+0x242/0x250 [ 1488.183089][ T2079] should_fail_usercopy+0x16/0x20 [ 1488.183109][ T2079] _copy_to_user+0x1a/0x90 [ 1488.183125][ T2079] bpf_verifier_vlog+0x137/0x230 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xde030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x2500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xa, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7400, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7a00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x300}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.183146][ T2079] __btf_verifier_log+0x80/0xa0 [ 1488.183211][ T2079] ? btf_parse_hdr+0x2f9/0x460 [ 1488.183272][ T2079] ? check_heap_object+0x1ab/0x3e0 [ 1488.183317][ T2079] btf_parse_hdr+0x30f/0x460 [ 1488.183420][ T2079] btf_new_fd+0x2af/0x600 [ 1488.183442][ T2079] bpf_btf_load+0x69/0x80 [ 1488.183506][ T2079] __sys_bpf+0x493/0x630 [ 1488.183537][ T2079] __x64_sys_bpf+0x3f/0x50 [ 1488.183561][ T2079] do_syscall_64+0x2b/0x70 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.183583][ T2079] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.183619][ T2079] RIP: 0033:0x7f451a476109 [ 1488.183633][ T2079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.183652][ T2079] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.183673][ T2079] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.183687][ T2079] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.183701][ T2079] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.183790][ T2079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.183805][ T2079] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.183823][ T2079] [ 1488.195153][ T2082] FAULT_INJECTION: forcing a failure. 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe0030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xd, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x5f00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xe, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x600}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) [ 1488.195153][ T2082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.195198][ T2082] CPU: 0 PID: 2082 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x1000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) [ 1488.195265][ T2082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:39:59 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe2030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x700}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x10, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x2000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:39:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x3000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:39:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x11, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:39:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:39:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x900}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.195293][ T2082] Call Trace: [ 1488.195298][ T2082] [ 1488.195305][ T2082] dump_stack_lvl+0xd6/0x122 [ 1488.195331][ T2082] dump_stack+0x11/0x12 [ 1488.195353][ T2082] should_fail+0x242/0x250 [ 1488.195375][ T2082] should_fail_usercopy+0x16/0x20 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x12, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.195433][ T2082] _copy_to_user+0x1a/0x90 [ 1488.195454][ T2082] bpf_verifier_vlog+0x137/0x230 [ 1488.195535][ T2082] __btf_verifier_log+0x80/0xa0 [ 1488.195564][ T2082] ? btf_parse_hdr+0x2b9/0x460 [ 1488.195587][ T2082] ? check_heap_object+0x1ab/0x3e0 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe4030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xa00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7400, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1b, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xb00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.195662][ T2082] btf_parse_hdr+0x2cf/0x460 [ 1488.195723][ T2082] btf_new_fd+0x2af/0x600 [ 1488.195744][ T2082] bpf_btf_load+0x69/0x80 [ 1488.195762][ T2082] __sys_bpf+0x493/0x630 [ 1488.195868][ T2082] __x64_sys_bpf+0x3f/0x50 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7a00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x25, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.195893][ T2082] do_syscall_64+0x2b/0x70 [ 1488.195917][ T2082] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.195991][ T2082] RIP: 0033:0x7fd3d038f109 [ 1488.196006][ T2082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.196024][ T2082] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.196044][ T2082] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.196099][ T2082] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe6030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x43, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x48, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xd00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.196112][ T2082] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.196124][ T2082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.196138][ T2082] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.196155][ T2082] [ 1488.283310][ T2092] FAULT_INJECTION: forcing a failure. 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x8000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x2000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.283310][ T2092] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe8030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x9000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xe00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x3000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1100}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.283335][ T2092] CPU: 1 PID: 2092 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.283360][ T2092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.283374][ T2092] Call Trace: [ 1488.283382][ T2092] [ 1488.283389][ T2092] dump_stack_lvl+0xd6/0x122 [ 1488.283479][ T2092] dump_stack+0x11/0x12 [ 1488.283499][ T2092] should_fail+0x242/0x250 [ 1488.283522][ T2092] should_fail_usercopy+0x16/0x20 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x68, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xa000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.283585][ T2092] _copy_to_user+0x1a/0x90 [ 1488.283604][ T2092] bpf_verifier_vlog+0x137/0x230 [ 1488.283625][ T2092] __btf_verifier_log+0x80/0xa0 [ 1488.283648][ T2092] ? btf_parse_hdr+0x2d9/0x460 [ 1488.283669][ T2092] ? check_heap_object+0x1ab/0x3e0 [ 1488.283763][ T2092] btf_parse_hdr+0x2ef/0x460 [ 1488.283785][ T2092] btf_new_fd+0x2af/0x600 [ 1488.283808][ T2092] bpf_btf_load+0x69/0x80 [ 1488.283826][ T2092] __sys_bpf+0x493/0x630 [ 1488.283962][ T2092] __x64_sys_bpf+0x3f/0x50 [ 1488.283987][ T2092] do_syscall_64+0x2b/0x70 [ 1488.284078][ T2092] entry_SYSCALL_64_after_hwframe+0x46/0xb0 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xea030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xb000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1200}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6c, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.284102][ T2092] RIP: 0033:0x7fd3d038f109 [ 1488.284117][ T2092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.284154][ T2092] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x74, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7a, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.284177][ T2092] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.284191][ T2092] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.284205][ T2092] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.284297][ T2092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.284311][ T2092] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.284327][ T2092] [ 1488.284841][ T2093] FAULT_INJECTION: forcing a failure. [ 1488.284841][ T2093] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xec030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xd000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x92, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x8000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc5, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x9000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4300}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xe000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.284859][ T2093] CPU: 0 PID: 2093 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.284915][ T2093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.284927][ T2093] Call Trace: 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xa000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.284932][ T2093] [ 1488.284970][ T2093] dump_stack_lvl+0xd6/0x122 [ 1488.284995][ T2093] dump_stack+0x11/0x12 [ 1488.285016][ T2093] should_fail+0x242/0x250 [ 1488.285036][ T2093] should_fail_usercopy+0x16/0x20 [ 1488.285057][ T2093] _copy_to_user+0x1a/0x90 [ 1488.285076][ T2093] bpf_verifier_vlog+0x137/0x230 [ 1488.285177][ T2093] __btf_verifier_log+0x80/0xa0 [ 1488.285200][ T2093] ? bpf_verifier_vlog+0x174/0x230 [ 1488.285222][ T2093] ? check_heap_object+0x1ab/0x3e0 [ 1488.285248][ T2093] btf_parse_hdr+0x328/0x460 [ 1488.285346][ T2093] btf_new_fd+0x2af/0x600 [ 1488.285394][ T2093] bpf_btf_load+0x69/0x80 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xee030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4800}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x10000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x300, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xb000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x11000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.285411][ T2093] __sys_bpf+0x493/0x630 [ 1488.285437][ T2093] __x64_sys_bpf+0x3f/0x50 [ 1488.285468][ T2093] do_syscall_64+0x2b/0x70 [ 1488.285490][ T2093] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.285509][ T2093] RIP: 0033:0x7f451a476109 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x600, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4c00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.285521][ T2093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.285551][ T2093] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.285570][ T2093] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.285583][ T2093] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.285596][ T2093] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.285609][ T2093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:40:00 executing program 2: syz_clone(0xc08ab000, 0x0, 0xefffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x12000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6800}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x700, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xd000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xe000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x16000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.285626][ T2093] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.285643][ T2093] [ 1488.336651][ T2105] FAULT_INJECTION: forcing a failure. [ 1488.336651][ T2105] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.336677][ T2105] CPU: 0 PID: 2105 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.336703][ T2105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.336731][ T2105] Call Trace: 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6c00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x900, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) [ 1488.336737][ T2105] [ 1488.336744][ T2105] dump_stack_lvl+0xd6/0x122 [ 1488.336785][ T2105] dump_stack+0x11/0x12 [ 1488.336806][ T2105] should_fail+0x242/0x250 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x25000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7400}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xa00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x10000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xb00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x48000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x11000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.336829][ T2105] should_fail_usercopy+0x16/0x20 [ 1488.336895][ T2105] _copy_to_user+0x1a/0x90 [ 1488.336914][ T2105] bpf_verifier_vlog+0x137/0x230 [ 1488.336935][ T2105] __btf_verifier_log+0x80/0xa0 [ 1488.337033][ T2105] ? btf_parse_hdr+0x2f9/0x460 [ 1488.337055][ T2105] btf_parse_hdr+0x30f/0x460 [ 1488.337078][ T2105] btf_new_fd+0x2af/0x600 [ 1488.337108][ T2105] bpf_btf_load+0x69/0x80 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7a00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.337127][ T2105] __sys_bpf+0x493/0x630 [ 1488.337156][ T2105] __x64_sys_bpf+0x3f/0x50 [ 1488.337180][ T2105] do_syscall_64+0x2b/0x70 [ 1488.337258][ T2105] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.337385][ T2105] RIP: 0033:0x7fd3d038f109 [ 1488.337400][ T2105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.337499][ T2105] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.337521][ T2105] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0ffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x12000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x8900}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x68000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) [ 1488.337535][ T2105] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x6c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xd00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x1a000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) [ 1488.337555][ T2105] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.337568][ T2105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.337582][ T2105] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.337598][ T2105] [ 1488.342319][ T2106] FAULT_INJECTION: forcing a failure. [ 1488.342319][ T2106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.342343][ T2106] CPU: 0 PID: 2106 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf2030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x25000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x74000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xe00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xfffff}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x400000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x7a000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1100, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x48000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: syz_clone(0xc08ab000, 0x0, 0xefffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) [ 1488.342367][ T2106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.342387][ T2106] Call Trace: [ 1488.342393][ T2106] [ 1488.342399][ T2106] dump_stack_lvl+0xd6/0x122 [ 1488.342425][ T2106] dump_stack+0x11/0x12 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1200, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.342500][ T2106] should_fail+0x242/0x250 [ 1488.342590][ T2106] should_fail_usercopy+0x16/0x20 [ 1488.342610][ T2106] _copy_to_user+0x1a/0x90 [ 1488.342630][ T2106] bpf_verifier_vlog+0x137/0x230 [ 1488.342652][ T2106] __btf_verifier_log+0x80/0xa0 [ 1488.342675][ T2106] ? put_dec+0xcd/0xe0 [ 1488.342744][ T2106] __btf_verifier_log_type+0x2f6/0x3f0 [ 1488.342767][ T2106] ? number+0xaa9/0xbe0 [ 1488.342786][ T2106] ? sort_r+0xb4c/0xb60 [ 1488.342868][ T2106] ? btf_enum_check_meta+0x11b/0x7d0 [ 1488.342907][ T2106] btf_enum_check_meta+0x1ea/0x7d0 [ 1488.342931][ T2106] ? check_heap_object+0x1ab/0x3e0 [ 1488.342957][ T2106] btf_check_all_metas+0x232/0x540 [ 1488.343024][ T2106] btf_parse_type_sec+0xba/0xfa0 [ 1488.343047][ T2106] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.343070][ T2106] ? btf_parse_hdr+0x456/0x460 [ 1488.343090][ T2106] btf_new_fd+0x3a3/0x600 [ 1488.343111][ T2106] bpf_btf_load+0x69/0x80 [ 1488.343139][ T2106] __sys_bpf+0x493/0x630 [ 1488.343197][ T2106] __x64_sys_bpf+0x3f/0x50 [ 1488.343221][ T2106] do_syscall_64+0x2b/0x70 [ 1488.343243][ T2106] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.343334][ T2106] RIP: 0033:0x7f451a476109 [ 1488.343349][ T2106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.343367][ T2106] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.343387][ T2106] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.343467][ T2106] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf4030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x80ffff}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0xc5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1b00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x2500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x5f000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.343513][ T2106] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.343526][ T2106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.343553][ T2106] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.343569][ T2106] [ 1488.498368][ T2115] FAULT_INJECTION: forcing a failure. [ 1488.498368][ T2115] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x68000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.498393][ T2115] CPU: 0 PID: 2115 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.498417][ T2115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.498429][ T2115] Call Trace: [ 1488.498498][ T2115] [ 1488.498505][ T2115] dump_stack_lvl+0xd6/0x122 [ 1488.498541][ T2115] dump_stack+0x11/0x12 [ 1488.498563][ T2115] should_fail+0x242/0x250 [ 1488.498585][ T2115] should_fail_usercopy+0x16/0x20 [ 1488.498607][ T2115] _copy_to_user+0x1a/0x90 [ 1488.498687][ T2115] bpf_verifier_vlog+0x137/0x230 [ 1488.498708][ T2115] __btf_verifier_log+0x80/0xa0 [ 1488.498731][ T2115] ? bpf_verifier_vlog+0x174/0x230 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x6c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4300, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x74000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x3000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.498795][ T2115] ? check_heap_object+0x1ab/0x3e0 [ 1488.498822][ T2115] btf_parse_hdr+0x328/0x460 [ 1488.498843][ T2115] btf_new_fd+0x2af/0x600 [ 1488.498937][ T2115] bpf_btf_load+0x69/0x80 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x7a000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.499026][ T2115] __sys_bpf+0x493/0x630 [ 1488.499106][ T2115] __x64_sys_bpf+0x3f/0x50 [ 1488.499131][ T2115] do_syscall_64+0x2b/0x70 [ 1488.499157][ T2115] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.499181][ T2115] RIP: 0033:0x7fd3d038f109 [ 1488.499196][ T2115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.499215][ T2115] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.499236][ T2115] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 14:40:01 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf6030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x35, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0xc5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x5000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3ee, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.499250][ T2115] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.499333][ T2115] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.499346][ T2115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3f3, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.499358][ T2115] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.499374][ T2115] [ 1488.501232][ T2117] FAULT_INJECTION: forcing a failure. [ 1488.501232][ T2117] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf8030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6800, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3f4, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6c00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.501255][ T2117] CPU: 1 PID: 2117 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.501282][ T2117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.501297][ T2117] Call Trace: [ 1488.501302][ T2117] [ 1488.501307][ T2117] dump_stack_lvl+0xd6/0x122 [ 1488.501332][ T2117] dump_stack+0x11/0x12 [ 1488.501354][ T2117] should_fail+0x242/0x250 [ 1488.501375][ T2117] should_fail_usercopy+0x16/0x20 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3f5, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.501396][ T2117] _copy_to_user+0x1a/0x90 [ 1488.501428][ T2117] bpf_verifier_vlog+0x137/0x230 [ 1488.501449][ T2117] btf_verifier_log+0x140/0x170 [ 1488.501472][ T2117] btf_enum_log+0x3b/0x40 [ 1488.501492][ T2117] __btf_verifier_log_type+0x331/0x3f0 [ 1488.501572][ T2117] ? number+0xaa9/0xbe0 [ 1488.501593][ T2117] ? sort_r+0xb4c/0xb60 [ 1488.501614][ T2117] ? btf_enum_check_meta+0x11b/0x7d0 [ 1488.501670][ T2117] btf_enum_check_meta+0x1ea/0x7d0 [ 1488.501695][ T2117] ? check_heap_object+0x1ab/0x3e0 [ 1488.501725][ T2117] btf_check_all_metas+0x232/0x540 [ 1488.501748][ T2117] btf_parse_type_sec+0xba/0xfa0 [ 1488.501866][ T2117] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.501971][ T2117] ? btf_parse_hdr+0x456/0x460 [ 1488.501992][ T2117] btf_new_fd+0x3a3/0x600 [ 1488.502069][ T2117] bpf_btf_load+0x69/0x80 [ 1488.502089][ T2117] __sys_bpf+0x493/0x630 [ 1488.502120][ T2117] __x64_sys_bpf+0x3f/0x50 [ 1488.502173][ T2117] do_syscall_64+0x2b/0x70 [ 1488.502198][ T2117] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.502223][ T2117] RIP: 0033:0x7f451a476109 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfa030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x8000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7400, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3f6, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x17, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3f8, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x9000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x35, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7a00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x3fe, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.502238][ T2117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x9200, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3ee, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xa000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xb000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) [ 1488.502292][ T2117] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.502369][ T2117] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.502382][ T2117] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.502395][ T2117] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.502455][ T2117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc500, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3f3, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x3, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.502469][ T2117] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.502487][ T2117] 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xfffff, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x4, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3f4, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x400000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xd000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.551655][ T2130] FAULT_INJECTION: forcing a failure. [ 1488.551655][ T2130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.551681][ T2130] CPU: 1 PID: 2130 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.551738][ T2130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.551751][ T2130] Call Trace: 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x5, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3f5, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xe000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.551756][ T2130] [ 1488.551763][ T2130] dump_stack_lvl+0xd6/0x122 [ 1488.551790][ T2130] dump_stack+0x11/0x12 [ 1488.551810][ T2130] should_fail+0x242/0x250 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3f6, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x80ffff, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x6, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x10000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x7, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3f8, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.551831][ T2130] should_fail_usercopy+0x16/0x20 [ 1488.551915][ T2130] _copy_to_user+0x1a/0x90 [ 1488.551936][ T2130] bpf_verifier_vlog+0x137/0x230 [ 1488.551957][ T2130] __btf_verifier_log+0x80/0xa0 [ 1488.551984][ T2130] __btf_verifier_log_type+0x3c3/0x3f0 [ 1488.552070][ T2130] ? number+0xaa9/0xbe0 [ 1488.552091][ T2130] ? sort_r+0xb4c/0xb60 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x11000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x12000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.552111][ T2130] ? btf_enum_check_meta+0x11b/0x7d0 [ 1488.552212][ T2130] btf_enum_check_meta+0x1ea/0x7d0 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfe030000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x3fe, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x8, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x2000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x25000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x43000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x3000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) [ 1488.552292][ T2130] ? check_heap_object+0x1ab/0x3e0 [ 1488.552319][ T2130] btf_check_all_metas+0x232/0x540 [ 1488.552343][ T2130] btf_parse_type_sec+0xba/0xfa0 [ 1488.552408][ T2130] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.552432][ T2130] ? btf_parse_hdr+0x456/0x460 [ 1488.552523][ T2130] btf_new_fd+0x3a3/0x600 [ 1488.552544][ T2130] bpf_btf_load+0x69/0x80 [ 1488.552561][ T2130] __sys_bpf+0x493/0x630 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x9, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x48000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.552607][ T2130] __x64_sys_bpf+0x3f/0x50 [ 1488.552632][ T2130] do_syscall_64+0x2b/0x70 [ 1488.552656][ T2130] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.552744][ T2130] RIP: 0033:0x7f451a476109 14:40:02 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfeffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xa, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x4c000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.552759][ T2130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.552778][ T2130] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.552799][ T2130] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.552812][ T2130] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:40:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x3, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xb, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x68000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.552904][ T2130] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.552917][ T2130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.552931][ T2130] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 14:40:03 executing program 2: syz_clone(0xc08ab000, 0x0, 0xff8f0000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x4, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xc, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6c000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x74000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x5, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xd, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.552947][ T2130] [ 1488.558295][ T2127] FAULT_INJECTION: forcing a failure. [ 1488.558295][ T2127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.558318][ T2127] CPU: 1 PID: 2127 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.558345][ T2127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x6, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.558357][ T2127] Call Trace: [ 1488.558362][ T2127] [ 1488.558368][ T2127] dump_stack_lvl+0xd6/0x122 [ 1488.558395][ T2127] dump_stack+0x11/0x12 [ 1488.558416][ T2127] should_fail+0x242/0x250 [ 1488.558437][ T2127] should_fail_usercopy+0x16/0x20 [ 1488.558539][ T2127] _copy_to_user+0x1a/0x90 [ 1488.558559][ T2127] bpf_verifier_vlog+0x137/0x230 [ 1488.558581][ T2127] __btf_verifier_log+0x80/0xa0 [ 1488.558636][ T2127] ? put_dec+0xcd/0xe0 [ 1488.558656][ T2127] __btf_verifier_log_type+0x2f6/0x3f0 [ 1488.558756][ T2127] ? number+0xaa9/0xbe0 [ 1488.558776][ T2127] ? sort_r+0xb4c/0xb60 [ 1488.558794][ T2127] ? btf_enum_check_meta+0x11b/0x7d0 [ 1488.558878][ T2127] btf_enum_check_meta+0x1ea/0x7d0 [ 1488.558957][ T2127] ? check_heap_object+0x1ab/0x3e0 [ 1488.558986][ T2127] btf_check_all_metas+0x232/0x540 [ 1488.559007][ T2127] btf_parse_type_sec+0xba/0xfa0 [ 1488.559069][ T2127] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.559161][ T2127] ? btf_parse_hdr+0x456/0x460 [ 1488.559181][ T2127] btf_new_fd+0x3a3/0x600 [ 1488.559204][ T2127] bpf_btf_load+0x69/0x80 [ 1488.559256][ T2127] __sys_bpf+0x493/0x630 [ 1488.559378][ T2127] __x64_sys_bpf+0x3f/0x50 [ 1488.559404][ T2127] do_syscall_64+0x2b/0x70 [ 1488.559426][ T2127] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.559463][ T2127] RIP: 0033:0x7fd3d038f109 [ 1488.559478][ T2127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.559496][ T2127] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.559574][ T2127] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 14:40:03 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffff0300, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x7a000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x8000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xe, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 3: syz_clone(0xc08ab000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x7, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x89000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x10, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x8, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x9000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.559588][ T2127] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.559601][ T2127] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x11, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xc5000000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.559638][ T2127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.559651][ T2127] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.559668][ T2127] [ 1488.582376][ T2134] FAULT_INJECTION: forcing a failure. [ 1488.582376][ T2134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.582401][ T2134] CPU: 1 PID: 2134 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.582425][ T2134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.582437][ T2134] Call Trace: [ 1488.582442][ T2134] [ 1488.582449][ T2134] dump_stack_lvl+0xd6/0x122 [ 1488.582510][ T2134] dump_stack+0x11/0x12 [ 1488.582602][ T2134] should_fail+0x242/0x250 [ 1488.582622][ T2134] should_fail_usercopy+0x16/0x20 14:40:03 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffff1f00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x9, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xa000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x12, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.582664][ T2134] _copy_to_user+0x1a/0x90 [ 1488.582683][ T2134] simple_read_from_buffer+0xab/0x120 [ 1488.582707][ T2134] proc_fail_nth_read+0x10d/0x150 [ 1488.582780][ T2134] ? proc_fault_inject_write+0x230/0x230 [ 1488.582913][ T2134] vfs_read+0x1a1/0x6a0 [ 1488.582932][ T2134] ? __fget_files+0x1d2/0x210 [ 1488.582953][ T2134] ksys_read+0xe8/0x1a0 [ 1488.582973][ T2134] __x64_sys_read+0x3e/0x50 [ 1488.582993][ T2134] do_syscall_64+0x2b/0x70 14:40:03 executing program 3: syz_clone(0xc08ab000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xffff0f00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xa, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xb000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x16, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0xffff8000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x25, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.583069][ T2134] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.583093][ T2134] RIP: 0033:0x7f81dcc1dcbc [ 1488.583109][ T2134] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1488.583127][ T2134] RSP: 002b:00007f81dc3e1160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1488.583148][ T2134] RAX: ffffffffffffffda RBX: 00007f81dcd7df60 RCX: 00007f81dcc1dcbc [ 1488.583161][ T2134] RDX: 000000000000000f RSI: 00007f81dc3e11e0 RDI: 0000000000000003 [ 1488.583174][ T2134] RBP: 00007f81dc3e11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.583194][ T2134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.583207][ T2134] R13: 00007ffe885368ef R14: 00007f81dc3e1300 R15: 0000000000022000 [ 1488.583222][ T2134] [ 1488.681936][ T2144] FAULT_INJECTION: forcing a failure. [ 1488.681936][ T2144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.681963][ T2144] CPU: 1 PID: 2144 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.681988][ T2144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.682062][ T2144] Call Trace: [ 1488.682069][ T2144] [ 1488.682076][ T2144] dump_stack_lvl+0xd6/0x122 [ 1488.682102][ T2144] dump_stack+0x11/0x12 [ 1488.682123][ T2144] should_fail+0x242/0x250 [ 1488.682206][ T2144] should_fail_usercopy+0x16/0x20 [ 1488.682226][ T2144] _copy_to_user+0x1a/0x90 [ 1488.682246][ T2144] bpf_verifier_vlog+0x137/0x230 [ 1488.682268][ T2144] btf_verifier_log+0x140/0x170 [ 1488.682303][ T2144] btf_enum_log+0x3b/0x40 [ 1488.682327][ T2144] __btf_verifier_log_type+0x331/0x3f0 [ 1488.682391][ T2144] ? number+0xaa9/0xbe0 [ 1488.682410][ T2144] ? btf_enum_check_meta+0x11b/0x7d0 [ 1488.682436][ T2144] btf_enum_check_meta+0x1ea/0x7d0 14:40:03 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffffff7f, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xb, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xd000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.682483][ T2144] ? check_heap_object+0x1ab/0x3e0 [ 1488.682547][ T2144] btf_check_all_metas+0x232/0x540 [ 1488.682621][ T2144] btf_parse_type_sec+0xba/0xfa0 [ 1488.682646][ T2144] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.682669][ T2144] ? btf_parse_hdr+0x456/0x460 [ 1488.682690][ T2144] btf_new_fd+0x3a3/0x600 [ 1488.682760][ T2144] bpf_btf_load+0x69/0x80 [ 1488.682777][ T2144] __sys_bpf+0x493/0x630 [ 1488.682849][ T2144] __x64_sys_bpf+0x3f/0x50 [ 1488.682918][ T2144] do_syscall_64+0x2b/0x70 [ 1488.682942][ T2144] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.682978][ T2144] RIP: 0033:0x7fd3d038f109 14:40:03 executing program 3: syz_clone(0xc08ab000, 0x0, 0xffff1f00, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x48, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xe000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xc, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x4c, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x10000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xd, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.682994][ T2144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.683087][ T2144] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.683107][ T2144] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.683121][ T2144] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.683135][ T2144] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.683148][ T2144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.683232][ T2144] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.683318][ T2144] [ 1488.685047][ T2146] FAULT_INJECTION: forcing a failure. [ 1488.685047][ T2146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.685071][ T2146] CPU: 0 PID: 2146 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.685097][ T2146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.685189][ T2146] Call Trace: [ 1488.685195][ T2146] [ 1488.685202][ T2146] dump_stack_lvl+0xd6/0x122 [ 1488.685275][ T2146] dump_stack+0x11/0x12 [ 1488.685297][ T2146] should_fail+0x242/0x250 [ 1488.685362][ T2146] should_fail_usercopy+0x16/0x20 [ 1488.685382][ T2146] _copy_to_user+0x1a/0x90 [ 1488.685445][ T2146] bpf_verifier_vlog+0x137/0x230 [ 1488.685474][ T2146] btf_verifier_log+0x140/0x170 [ 1488.685497][ T2146] ? btf_enum_check_meta+0x2ec/0x7d0 [ 1488.685593][ T2146] btf_enum_check_meta+0x76f/0x7d0 [ 1488.685623][ T2146] btf_check_all_metas+0x232/0x540 [ 1488.685648][ T2146] btf_parse_type_sec+0xba/0xfa0 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffffffa7, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x3}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x11000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xe, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x68, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x6c, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.685673][ T2146] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.685696][ T2146] ? btf_parse_hdr+0x456/0x460 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x10, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x12000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x74, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.685718][ T2146] btf_new_fd+0x3a3/0x600 [ 1488.685805][ T2146] bpf_btf_load+0x69/0x80 [ 1488.685824][ T2146] __sys_bpf+0x493/0x630 [ 1488.685917][ T2146] __x64_sys_bpf+0x3f/0x50 [ 1488.685941][ T2146] do_syscall_64+0x2b/0x70 [ 1488.685963][ T2146] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.685988][ T2146] RIP: 0033:0x7f451a476109 [ 1488.686004][ T2146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.686053][ T2146] RSP: 002b:00007f4519bec168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.686073][ T2146] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a476109 [ 1488.686088][ T2146] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.686114][ T2146] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.686128][ T2146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.686141][ T2146] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 [ 1488.686157][ T2146] [ 1488.723052][ T2156] FAULT_INJECTION: forcing a failure. 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffffffef, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x11, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x1b000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x7a, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x25000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.723052][ T2156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.723079][ T2156] CPU: 1 PID: 2156 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.723103][ T2156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.723115][ T2156] Call Trace: 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x12, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0xc5, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x6}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x1a, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.723121][ T2156] [ 1488.723127][ T2156] dump_stack_lvl+0xd6/0x122 [ 1488.723157][ T2156] dump_stack+0x11/0x12 [ 1488.723179][ T2156] should_fail+0x242/0x250 [ 1488.723200][ T2156] should_fail_usercopy+0x16/0x20 [ 1488.723271][ T2156] _copy_to_user+0x1a/0x90 [ 1488.723291][ T2156] bpf_verifier_vlog+0x137/0x230 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfffffff0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x2, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x7}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x43000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x25, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x48000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x48, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x3, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.723346][ T2156] btf_verifier_log+0x140/0x170 [ 1488.723451][ T2156] btf_enum_log+0x3b/0x40 [ 1488.723536][ T2156] __btf_verifier_log_type+0x331/0x3f0 [ 1488.723619][ T2156] ? number+0xaa9/0xbe0 [ 1488.723639][ T2156] ? sort_r+0xb4c/0xb60 [ 1488.723658][ T2156] ? btf_enum_check_meta+0x11b/0x7d0 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x8}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x5, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.723684][ T2156] btf_enum_check_meta+0x1ea/0x7d0 [ 1488.723749][ T2156] ? check_heap_object+0x1ab/0x3e0 [ 1488.723832][ T2156] btf_check_all_metas+0x232/0x540 [ 1488.723854][ T2156] btf_parse_type_sec+0xba/0xfa0 [ 1488.723878][ T2156] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.723902][ T2156] ? btf_parse_hdr+0x456/0x460 [ 1488.723944][ T2156] btf_new_fd+0x3a3/0x600 [ 1488.723967][ T2156] bpf_btf_load+0x69/0x80 [ 1488.723985][ T2156] __sys_bpf+0x493/0x630 [ 1488.724050][ T2156] __x64_sys_bpf+0x3f/0x50 [ 1488.724076][ T2156] do_syscall_64+0x2b/0x70 [ 1488.724101][ T2156] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.724141][ T2156] RIP: 0033:0x7fd3d038f109 [ 1488.724157][ T2156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1488.724176][ T2156] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.724243][ T2156] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.724257][ T2156] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x4c, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x6, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x5f, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xa}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x7, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x68000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.724271][ T2156] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x8, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.724284][ T2156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.724297][ T2156] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.724313][ T2156] [ 1488.724959][ T2157] FAULT_INJECTION: forcing a failure. [ 1488.724959][ T2157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.724984][ T2157] CPU: 0 PID: 2157 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1488.725007][ T2157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1488.725019][ T2157] Call Trace: [ 1488.725024][ T2157] [ 1488.725031][ T2157] dump_stack_lvl+0xd6/0x122 [ 1488.725055][ T2157] dump_stack+0x11/0x12 [ 1488.725075][ T2157] should_fail+0x242/0x250 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x68, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x6c000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xb}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x9, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xc}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xa, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x74000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.725143][ T2157] should_fail_usercopy+0x16/0x20 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x6c, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) [ 1488.725163][ T2157] _copy_to_user+0x1a/0x90 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x74, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1488.725182][ T2157] simple_read_from_buffer+0xab/0x120 [ 1488.725204][ T2157] proc_fail_nth_read+0x10d/0x150 [ 1488.725290][ T2157] ? proc_fault_inject_write+0x230/0x230 [ 1488.725312][ T2157] vfs_read+0x1a1/0x6a0 14:40:04 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfffffffe, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x7a000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xb, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xd}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x7a, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xe}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0xc5, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xc, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x92000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.725331][ T2157] ? __fget_files+0x1d2/0x210 [ 1488.725413][ T2157] ksys_read+0xe8/0x1a0 [ 1488.725432][ T2157] __x64_sys_read+0x3e/0x50 [ 1488.725452][ T2157] do_syscall_64+0x2b/0x70 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x10}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.725474][ T2157] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.725496][ T2157] RIP: 0033:0x7f451a428cbc 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1b0c31f000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x5, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xd, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xc5000000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x11}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xffff0f00, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xe, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.725544][ T2157] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1488.725563][ T2157] RSP: 002b:00007f4519bec160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1488.725622][ T2157] RAX: ffffffffffffffda RBX: 00007f451a588f60 RCX: 00007f451a428cbc [ 1488.725636][ T2157] RDX: 000000000000000f RSI: 00007f4519bec1e0 RDI: 0000000000000003 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x25}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.725671][ T2157] RBP: 00007f4519bec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.725685][ T2157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.725698][ T2157] R13: 00007ffd845f74bf R14: 00007f4519bec300 R15: 0000000000022000 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb30ed38000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x2, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0xffff8000, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x10, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x43}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.725738][ T2157] [ 1488.823322][ T2170] FAULT_INJECTION: forcing a failure. [ 1488.823322][ T2170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.823439][ T2170] CPU: 0 PID: 2170 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x11, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x3, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x48}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1488.823465][ T2170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x12, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.823477][ T2170] Call Trace: [ 1488.823483][ T2170] [ 1488.823489][ T2170] dump_stack_lvl+0xd6/0x122 [ 1488.823578][ T2170] dump_stack+0x11/0x12 [ 1488.823599][ T2170] should_fail+0x242/0x250 [ 1488.823620][ T2170] should_fail_usercopy+0x16/0x20 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0x40800000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x5, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x500, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x6, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x900, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1488.823641][ T2170] _copy_to_user+0x1a/0x90 [ 1488.823661][ T2170] bpf_verifier_vlog+0x137/0x230 [ 1488.823757][ T2170] btf_verifier_log+0x140/0x170 [ 1488.823781][ T2170] btf_enum_check_meta+0x5ac/0x7d0 [ 1488.823807][ T2170] btf_check_all_metas+0x232/0x540 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x68}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0xa, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.823871][ T2170] btf_parse_type_sec+0xba/0xfa0 [ 1488.823895][ T2170] ? btf_check_sec_info+0x1bf/0x1e0 [ 1488.823921][ T2170] ? btf_parse_hdr+0x456/0x460 [ 1488.823943][ T2170] btf_new_fd+0x3a3/0x600 [ 1488.824039][ T2170] bpf_btf_load+0x69/0x80 [ 1488.824058][ T2170] __sys_bpf+0x493/0x630 [ 1488.824086][ T2170] __x64_sys_bpf+0x3f/0x50 [ 1488.824180][ T2170] do_syscall_64+0x2b/0x70 [ 1488.824203][ T2170] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1488.824259][ T2170] RIP: 0033:0x7fd3d038f109 [ 1488.824275][ T2170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0x29f6c024d000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x6c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x7, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xa00, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x35, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x92, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: syz_clone(0xc08ab000, 0x0, 0x1b0c31f000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x74}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xb00, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x8, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x300, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) [ 1488.824293][ T2170] RSP: 002b:00007fd3cfb05168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1488.824314][ T2170] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d038f109 [ 1488.824328][ T2170] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000012 [ 1488.824342][ T2170] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1488.824356][ T2170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1488.824370][ T2170] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1488.824449][ T2170] [ 1489.508338][ T2302] FAULT_INJECTION: forcing a failure. [ 1489.508338][ T2302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1489.508365][ T2302] CPU: 0 PID: 2302 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1489.508390][ T2302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.508429][ T2302] Call Trace: [ 1489.508435][ T2302] [ 1489.508441][ T2302] dump_stack_lvl+0xd6/0x122 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0x553a285e4000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xc00, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x9, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x7a}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3ee, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x89}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xd00, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) [ 1489.508467][ T2302] dump_stack+0x11/0x12 [ 1489.508491][ T2302] should_fail+0x242/0x250 [ 1489.508512][ T2302] should_fail_usercopy+0x16/0x20 14:40:05 executing program 3: syz_clone(0xc08ab000, 0x0, 0x29f6c024d000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xa, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3f3, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0xe00, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xc5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1489.508536][ T2302] _copy_to_user+0x1a/0x90 [ 1489.508562][ T2302] simple_read_from_buffer+0xab/0x120 [ 1489.508587][ T2302] proc_fail_nth_read+0x10d/0x150 [ 1489.508612][ T2302] ? proc_fault_inject_write+0x230/0x230 [ 1489.508635][ T2302] vfs_read+0x1a1/0x6a0 [ 1489.508716][ T2302] ? __fget_files+0x1d2/0x210 [ 1489.508739][ T2302] ksys_read+0xe8/0x1a0 [ 1489.508759][ T2302] __x64_sys_read+0x3e/0x50 [ 1489.508778][ T2302] do_syscall_64+0x2b/0x70 [ 1489.508821][ T2302] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 1489.508854][ T2302] RIP: 0033:0x7fd3d0341cbc [ 1489.508935][ T2302] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1489.508955][ T2302] RSP: 002b:00007fd3cfb05160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1489.508977][ T2302] RAX: ffffffffffffffda RBX: 00007fd3d04a1f60 RCX: 00007fd3d0341cbc [ 1489.508992][ T2302] RDX: 000000000000000f RSI: 00007fd3cfb051e0 RDI: 0000000000000003 [ 1489.509006][ T2302] RBP: 00007fd3cfb051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1489.509020][ T2302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:40:05 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xb, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x1300, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3f4, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x300}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) [ 1489.509033][ T2302] R13: 00007ffcb8b150df R14: 00007fd3cfb05300 R15: 0000000000022000 [ 1489.509088][ T2302] 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x1500, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xc, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3f5, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x1600, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xd, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x600}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3f6, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xe, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xa}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3f8, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x10, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x700}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x11}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x11, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x3fe, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x900}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xa00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x12, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x10000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x500, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xb00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xc00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x3, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x4, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x900, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x10030000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xd00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x5, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xa00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xe00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x6, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xb00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x40000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xc00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x1100}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x7, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xd00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x1200}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x8, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x1e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x405e283a550000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x9, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x2500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0xe00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x0, 0x0, 0x0, 0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4000}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x1300, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xa, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x0, 0x0, 0x0, 0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xb, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0x80d30eb3000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x0, 0x0, 0x0, 0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4300}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xc, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x11}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4800}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xd, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x4c00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xffffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xe, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x31, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0xd024c0f6290000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x10, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x6800}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x11, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x30, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x6c00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000240)=""/198, 0x2f, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x12, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe0000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x7400}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x16}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x1b, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x7a00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x25, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0310c1b000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x43, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x8900}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x48, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0xc500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x4c, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x3}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x68, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x6c, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x4}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x74, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: syz_clone(0xc08ab000, 0x0, 0x10000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x300}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x7a, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x6}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x500}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x92, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x600}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x7}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0xc5, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: syz_clone(0xc08ab000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x8}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x300000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x8, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x700}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xa}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x9, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x900}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: syz_clone(0xc08ab000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xb}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0xa, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xc}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0xb, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xd}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x12, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xe}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x500000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x2, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x10}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x3, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1100}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x11}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x5, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1200}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x600000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x6, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1600}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x25}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x43}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x7, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2500}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5f}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 2: syz_clone(0xc08ab000, 0x0, 0x601000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4800}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x48}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x8, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x9, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x4c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6800}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xa, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x68}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xb, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7400}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x6c}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xc, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a00}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x74}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xd, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x300}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x7a}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc500}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xe, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x89}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0x802000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x600}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0xc5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x10, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x700}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x11, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x900}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x12, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x500, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0xb}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x900, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xa00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x2}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xb00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xc00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x5}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xd00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x6}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1100}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0xe00, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x1300, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1200}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x7}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc01000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x8}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1a00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x11}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4800}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:08 executing program 2: syz_clone(0xc08ab000, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3fe}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xa}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xb}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5f00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6800}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xc}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xd}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x16000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7400}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xe}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x10}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x11}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x500}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x900}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xa00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xb00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xc00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1600000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xd00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0xe00}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1800000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11000000}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x3}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x1300}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x5}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1a00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x2}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1b}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x3}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x8}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x4}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x5}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x43}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x9}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1c02000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x6}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1a000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xa}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x7}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xb}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x8}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1d02000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x9}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xd}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xa}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1e00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5f000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xb}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xe}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xc}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x10}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x92}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x11}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xd}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x12}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x300}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xe}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x16}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x25}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x10}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x11}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x600}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x48}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x12}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x700}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4c}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x25}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x900}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x68}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x43}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6c}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2400000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x3, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x48}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x74}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x4c}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x5, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7a}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2600000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x68}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc5}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x6c}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 2: syz_clone(0xc08ab000, 0x0, 0x2d02000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x74}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x8, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1100}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1200}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x7a}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x9, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x3}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x89}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3002000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xa, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1b00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x4}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0xc5}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xb, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x5}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3500000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x6}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x3}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x7}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4300}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x4}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xd, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3800000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x8}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xe, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x5}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4800}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x9}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x10, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x6}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xa}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3a00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x11, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6800}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x7}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xb}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xc}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x8}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x12, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x9}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7400}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x1a, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xd}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xa}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xb}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xe}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x25, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x48, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xc}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9200}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x10}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4c, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x11}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xd}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc500}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x5f, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xe}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4100000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x12}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x68, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x10}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6c, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x16}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x11}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x400000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x25}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x4a00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x80ffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x74, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x48}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x12}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x25}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x4c}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7a, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x68}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc5, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x43}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6700000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x6c}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x48}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x74}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x3000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x2, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x4c}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0x7a}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:11 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6802000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x3, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [], 0xc5}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x68}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x6c}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x8, 0xc6, 0x1}, 0x20) 14:40:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x5000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x4, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0x6d03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x74}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0xa, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x6, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x7a}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x18, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x7, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7501000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x64, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0x89}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x8, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x8000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x1001, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}, {0x0, [], 0xc5}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x9, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x9000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7502000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x8, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xa, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xa000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x5f5e0ff, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0xa, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xb000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xb, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x2}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x18, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0x7a02000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xc, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x64, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x8}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xd, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1001, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xd000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xe, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0x9903000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0xa}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xe000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x10, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x35}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x10000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x11, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3ee}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa105000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x11000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x12, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3f3}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x5f5e0ff, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x12000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x1f, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x1a, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3f4}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x2}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x1b000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x25, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3f5}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x25000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3f6}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x48, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x8}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3f8}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x43000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0xa7ffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x2b, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0xa}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x4c, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x48000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x3fe}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x4c000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0xffffff}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x35}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x68, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 2: syz_clone(0xc08ab000, 0x0, 0xb901000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x89}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x68000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x25) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x6c, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x300}, 0x20) 14:40:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x29) 14:40:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x6c000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x74, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x7a, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc200000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x90) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x74000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3ee}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xc5, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3f3}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x7a000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x7ffffffff000) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000fbffffff4ae2b54b00"/46], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc605000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3f4}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x2, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x92000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000fbffffff4ae2b54b00"/46], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000fbffffff4ae2b54b00"/46], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000fbffffff4ae2b54b00"/46], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xc5000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x3, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3f5}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xffff0f00}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xc705000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3f6}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x4, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}, {0x7, 0x2}, {0xf}, {0x5}, {0x6, 0xfffffffd}, {0x3, 0x6}, {0x9, 0x6}, {0xe, 0x8000}]}]}}, &(0x7f0000000040)=""/199, 0x2e, 0xc7, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xffff8000}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}, {0x7, 0x2}, {0xf}, {0x5}, {0x6, 0xfffffffd}, {0x3, 0x6}, {0x9, 0x6}, {0xe, 0x8000}]}]}}, &(0x7f0000000040)=""/199, 0x2e, 0xc7, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3f8}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x5, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x2, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xda03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}, {0x7, 0x2}, {0xf}, {0x5}, {0x6, 0xfffffffd}, {0x3, 0x6}, {0x9, 0x6}, {0xe, 0x8000}]}]}}, &(0x7f0000000040)=""/199, 0x2e, 0xc7, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x6, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x3fe}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x3, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x44}, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x81) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa8, r4, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x14}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8d}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x84}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8800}, 0x4801) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r5, 0x5201) openat$cgroup_subtree(r5, &(0x7f0000000040), 0x2, 0x0) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x7, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0xffffff}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x8, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xdc03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x9) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x5, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x9, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x44}, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x81) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa8, r4, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x14}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8d}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x84}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8800}, 0x4801) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r5, 0x5201) (async) openat$cgroup_subtree(r5, &(0x7f0000000040), 0x2, 0x0) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xa, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x25) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_batadv\x00'}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x44}, 0x1) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x81) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa8, r4, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x14}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8d}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x26}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x84}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x8800}, 0x4801) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async, rerun: 32) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (rerun: 32) ioctl$RFKILL_IOCTL_NOINPUT(r5, 0x5201) (async) openat$cgroup_subtree(r5, &(0x7f0000000040), 0x2, 0x0) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xde03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x29) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xb, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x8, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) pipe2$9p(&(0x7f0000000040), 0x80) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xc, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) pipe2$9p(&(0x7f0000000040), 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) pipe2$9p(&(0x7f0000000040), 0x80) (async) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x90) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x9, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe003000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x7ffffffff000) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) pipe2$9p(&(0x7f0000000040), 0x80) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xa, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xd, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000000000000000ba11d6c76f24312d7cf509bacc2bcb75fba1"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfffffffffffff98a}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040891}, 0x800) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe474}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1feb0100c1000000000000000c0000000c000000020000000000000000000006040000000000a39ead0d83a904308810bcd012e254c2e31b959ab77f46a1693bef36ea379718614ec8f73539307af9e603555d54910834861216909cbcf7f0d54999f8c5f42c2e5c1ba4297efd1ddbb4a7fac837b6cfb3e9936bbe4f6b22a7d42277a942e02278ba1a70f8f8de0286fb2cbb8e8bba3b58a630bf2cc5a73221d38576d13e317a45b013dba3995d96496acaba685212f7f23ae48d42946deb292cdcd6979c79b07d3bb3b2af91a70d235b5f8053c164997a4eb2547ff4dfc437e6"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xe, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xb, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000000000000000ba11d6c76f24312d7cf509bacc2bcb75fba1"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe203000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfffffffffffff98a}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040891}, 0x800) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe474}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1feb0100c1000000000000000c0000000c000000020000000000000000000006040000000000a39ead0d83a904308810bcd012e254c2e31b959ab77f46a1693bef36ea379718614ec8f73539307af9e603555d54910834861216909cbcf7f0d54999f8c5f42c2e5c1ba4297efd1ddbb4a7fac837b6cfb3e9936bbe4f6b22a7d42277a942e02278ba1a70f8f8de0286fb2cbb8e8bba3b58a630bf2cc5a73221d38576d13e317a45b013dba3995d96496acaba685212f7f23ae48d42946deb292cdcd6979c79b07d3bb3b2af91a70d235b5f8053c164997a4eb2547ff4dfc437e6"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfffffffffffff98a}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040891}, 0x800) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) (async) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe474}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1feb0100c1000000000000000c0000000c000000020000000000000000000006040000000000a39ead0d83a904308810bcd012e254c2e31b959ab77f46a1693bef36ea379718614ec8f73539307af9e603555d54910834861216909cbcf7f0d54999f8c5f42c2e5c1ba4297efd1ddbb4a7fac837b6cfb3e9936bbe4f6b22a7d42277a942e02278ba1a70f8f8de0286fb2cbb8e8bba3b58a630bf2cc5a73221d38576d13e317a45b013dba3995d96496acaba685212f7f23ae48d42946deb292cdcd6979c79b07d3bb3b2af91a70d235b5f8053c164997a4eb2547ff4dfc437e6"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x10, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000000000000000ba11d6c76f24312d7cf509bacc2bcb75fba1"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000000000000000ba11d6c76f24312d7cf509bacc2bcb75fba1"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x11, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x6, [@ptr={0xb, 0x0, 0x0, 0x2, 0x1}, @ptr={0xc}, @fwd={0xd}, @struct={0xb, 0x7, 0x0, 0x4, 0x1, 0x3, [{0x4, 0x9, 0xfffffeff}, {0x1, 0x0, 0x7fffffff}, {0xb, 0x0, 0x7}, {0x7, 0x1, 0x9}, {0xe, 0x4, 0x9}, {0x6, 0x0, 0x4}, {0x9, 0x2, 0x3ff}]}, @struct={0x9, 0x8, 0x0, 0x4, 0x0, 0xd9, [{0xc, 0x3, 0x5}, {0x5, 0x4, 0x4}, {0x6}, {0x7, 0x1, 0x9}, {0x3, 0x1, 0x9}, {0x2, 0x4, 0x33a5767e}, {0xd, 0x2e0, 0x539d}, {0xb, 0x5, 0x3}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x2e, 0x2e, 0x30, 0x2e]}}, &(0x7f0000000340)=""/147, 0x11a, 0x93}, 0x20) pipe2$9p(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4) write$P9_RATTACH(r1, &(0x7f00000005c0)={0x14, 0x69, 0x1, {0x0, 0x4, 0x3}}, 0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r0, 0x20, &(0x7f0000000500)={&(0x7f0000000400)=""/233, 0xe9, 0x0, &(0x7f0000000200)=""/19, 0x13}}, 0x10) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xd, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x40, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfffffffffffff98a}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040891}, 0x800) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}}, 0x0) (async) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe474}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1feb0100c1000000000000000c0000000c000000020000000000000000000006040000000000a39ead0d83a904308810bcd012e254c2e31b959ab77f46a1693bef36ea379718614ec8f73539307af9e603555d54910834861216909cbcf7f0d54999f8c5f42c2e5c1ba4297efd1ddbb4a7fac837b6cfb3e9936bbe4f6b22a7d42277a942e02278ba1a70f8f8de0286fb2cbb8e8bba3b58a630bf2cc5a73221d38576d13e317a45b013dba3995d96496acaba685212f7f23ae48d42946deb292cdcd6979c79b07d3bb3b2af91a70d235b5f8053c164997a4eb2547ff4dfc437e6"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x12, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe403000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@enum]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x30, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xe, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x6, [@ptr={0xb, 0x0, 0x0, 0x2, 0x1}, @ptr={0xc}, @fwd={0xd}, @struct={0xb, 0x7, 0x0, 0x4, 0x1, 0x3, [{0x4, 0x9, 0xfffffeff}, {0x1, 0x0, 0x7fffffff}, {0xb, 0x0, 0x7}, {0x7, 0x1, 0x9}, {0xe, 0x4, 0x9}, {0x6, 0x0, 0x4}, {0x9, 0x2, 0x3ff}]}, @struct={0x9, 0x8, 0x0, 0x4, 0x0, 0xd9, [{0xc, 0x3, 0x5}, {0x5, 0x4, 0x4}, {0x6}, {0x7, 0x1, 0x9}, {0x3, 0x1, 0x9}, {0x2, 0x4, 0x33a5767e}, {0xd, 0x2e0, 0x539d}, {0xb, 0x5, 0x3}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x2e, 0x2e, 0x30, 0x2e]}}, &(0x7f0000000340)=""/147, 0x11a, 0x93}, 0x20) pipe2$9p(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4) write$P9_RATTACH(r1, &(0x7f00000005c0)={0x14, 0x69, 0x1, {0x0, 0x4, 0x3}}, 0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r0, 0x20, &(0x7f0000000500)={&(0x7f0000000400)=""/233, 0xe9, 0x0, &(0x7f0000000200)=""/19, 0x13}}, 0x10) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x1a, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x25, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) (async, rerun: 64) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (rerun: 64) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) (async) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async, rerun: 64) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) (rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@enum]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x30, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x10, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x6, [@ptr={0xb, 0x0, 0x0, 0x2, 0x1}, @ptr={0xc}, @fwd={0xd}, @struct={0xb, 0x7, 0x0, 0x4, 0x1, 0x3, [{0x4, 0x9, 0xfffffeff}, {0x1, 0x0, 0x7fffffff}, {0xb, 0x0, 0x7}, {0x7, 0x1, 0x9}, {0xe, 0x4, 0x9}, {0x6, 0x0, 0x4}, {0x9, 0x2, 0x3ff}]}, @struct={0x9, 0x8, 0x0, 0x4, 0x0, 0xd9, [{0xc, 0x3, 0x5}, {0x5, 0x4, 0x4}, {0x6}, {0x7, 0x1, 0x9}, {0x3, 0x1, 0x9}, {0x2, 0x4, 0x33a5767e}, {0xd, 0x2e0, 0x539d}, {0xb, 0x5, 0x3}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x2e, 0x2e, 0x30, 0x2e]}}, &(0x7f0000000340)=""/147, 0x11a, 0x93}, 0x20) pipe2$9p(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4) (async) write$P9_RATTACH(r1, &(0x7f00000005c0)={0x14, 0x69, 0x1, {0x0, 0x4, 0x3}}, 0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r0, 0x20, &(0x7f0000000500)={&(0x7f0000000400)=""/233, 0xe9, 0x0, &(0x7f0000000200)=""/19, 0x13}}, 0x10) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x48, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe603000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) r1 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x11, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@enum]}, {0x0, [0x30, 0x30, 0x5f, 0x2e, 0x0, 0x61, 0x0, 0x61, 0x30, 0x0]}}, &(0x7f0000000240)=""/198, 0x30, 0xc6, 0x1}, 0x20) 14:40:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x4c, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000007bc00c00000002000000000000000000000604000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0xa, 0x1}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000080)=""/95, 0x39, 0x5f}, 0x20) 14:40:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x12, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:13 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) (async) r1 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000007bc00c00000002000000000000000000000604000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0xa, 0x1}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000080)=""/95, 0x39, 0x5f}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000007bc00c00000002000000000000000000000604000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0xa, 0x1}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000080)=""/95, 0x39, 0x5f}, 0x20) (async) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x1b, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xe803000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x5f, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) 14:40:14 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) r1 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) socket$inet6_dccp(0xa, 0x6, 0x0) (async) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) (async) accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000007bc00c00000002000000000000000000000604000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x52, 0x0, 0xa, 0x1}]}, {0x0, [0x5f, 0x0, 0x0]}}, &(0x7f0000000080)=""/95, 0x39, 0x5f}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x25, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = io_uring_setup(0x2fef, &(0x7f0000000040)={0x0, 0xa17, 0x20, 0x0, 0xb3}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) io_uring_setup(0x582, &(0x7f00000000c0)={0x0, 0x8b1b, 0x20, 0x2, 0x8233, 0x0, r0}) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x43, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x68, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000200000000000000010000060400000005000000000000000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000200000000000000010000060400000005000000000000000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000200000000000000010000060400000005000000000000000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = io_uring_setup(0x2fef, &(0x7f0000000040)={0x0, 0xa17, 0x20, 0x0, 0xb3}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) io_uring_setup(0x582, &(0x7f00000000c0)={0x0, 0x8b1b, 0x20, 0x2, 0x8233, 0x0, r0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) io_uring_setup(0x2fef, &(0x7f0000000040)={0x0, 0xa17, 0x20, 0x0, 0xb3}) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) (async) io_uring_setup(0x582, &(0x7f00000000c0)={0x0, 0x8b1b, 0x20, 0x2, 0x8233, 0x0, r0}) (async) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x48, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x33, 0x0, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x6c, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000200000000000000010000060400000005000000000000000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000200000000000000010000060400000005000000000000000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x4c, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x74, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000004000100000604000000050000000000000000007241e83ba50b8119adcb126300dc775658df01f231f9309fa160256938cc00074690bc3baf00c0411d29f4dd83191effdd62475b14953257e3d41f91c4037bdf07ec61ca39c5feb485834950a442004d7e2e2d5e2ede5c315b4437e9cc6e8d4e40d3923091c30ca7a4f52c82462e7d4136b52465f29236422604434eb64b78bdebf83f077476b13fb127667746a5b33b082d0b7c353cc26e41a459ba26d795fa64b770deefd26ed48052704c1bfe6d4c58b9e5d668112761ba20a134163b35638d7dc96ab6ab0399753b1b1b700a2915025e7f1263e4814de341aa51f0eccddf8694d72aefd7636b8ffe8a083085"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = io_uring_setup(0x2fef, &(0x7f0000000040)={0x0, 0xa17, 0x20, 0x0, 0xb3}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) io_uring_setup(0x582, &(0x7f00000000c0)={0x0, 0x8b1b, 0x20, 0x2, 0x8233, 0x0, r0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) io_uring_setup(0x2fef, &(0x7f0000000040)={0x0, 0xa17, 0x20, 0x0, 0xb3}) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) (async) io_uring_setup(0x582, &(0x7f00000000c0)={0x0, 0x8b1b, 0x20, 0x2, 0x8233, 0x0, r0}) (async) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x68, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xec03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x7a, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x6c, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:40:14 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) (async) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000004000100000604000000050000000000000000007241e83ba50b8119adcb126300dc775658df01f231f9309fa160256938cc00074690bc3baf00c0411d29f4dd83191effdd62475b14953257e3d41f91c4037bdf07ec61ca39c5feb485834950a442004d7e2e2d5e2ede5c315b4437e9cc6e8d4e40d3923091c30ca7a4f52c82462e7d4136b52465f29236422604434eb64b78bdebf83f077476b13fb127667746a5b33b082d0b7c353cc26e41a459ba26d795fa64b770deefd26ed48052704c1bfe6d4c58b9e5d668112761ba20a134163b35638d7dc96ab6ab0399753b1b1b700a2915025e7f1263e4814de341aa51f0eccddf8694d72aefd7636b8ffe8a083085"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000040)=""/204, 0x26, 0xcc, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x74, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000040)=""/204, 0x26, 0xcc, 0x1}, 0x20) 14:40:14 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xc5, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5, 0xfffff}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x7a, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xee03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000009c00000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x0, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x0, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0xcf}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0x3a0}, @IPVS_DEST_ATTR_TUN_FLAGS={0x0, 0xf, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x0, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x0, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x9}]}, 0xfffffffffffffe9b}, 0x1, 0x0, 0x0, 0x8880}, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES16=0x0, @ANYRESOCT=r2, @ANYBLOB], 0x68}}, 0x40000c4) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000040)=""/204, 0x26, 0xcc, 0x1}, 0x20) 14:40:14 executing program 3: syz_clone(0xc08ab000, 0x0, 0xea03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x92, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000009c00000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x0, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x0, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0xcf}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0x3a0}, @IPVS_DEST_ATTR_TUN_FLAGS={0x0, 0xf, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x0, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x0, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x9}]}, 0xfffffffffffffe9b}, 0x1, 0x0, 0x0, 0x8880}, 0x0) (async) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) (async, rerun: 32) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) (rerun: 32) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) (async, rerun: 32) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES16=0x0, @ANYRESOCT=r2, @ANYBLOB], 0x68}}, 0x40000c4) (rerun: 32) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0xc5, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x80, 0x3f, 0x10, @mcast2, @mcast2, 0x700, 0x700, 0x7, 0x81}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48400014}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x48, r0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004041}, 0x44804) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=[0x8, 0xffff, 0xf96c, 0xfffb, 0x7, 0x22, 0x4, 0x5cc, 0x4, 0xc5d]) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01000000000000000000040000000c000000000000000000000000060400000000000000988e94d86595b939"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x2, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000009c00000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x0, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x0, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0xcf}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0x3a0}, @IPVS_DEST_ATTR_TUN_FLAGS={0x0, 0xf, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x0, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x0, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x9}]}, 0xfffffffffffffe9b}, 0x1, 0x0, 0x0, 0x8880}, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES16=0x0, @ANYRESOCT=r2, @ANYBLOB], 0x68}}, 0x40000c4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000009c00000000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x0, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x0, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x0, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x0, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x0, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x0, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x0, 0x6, 0xcf}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x0, 0x7, 0x3a0}, @IPVS_DEST_ATTR_TUN_FLAGS={0x0, 0xf, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x0, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x0, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x0, 0x2, 0xff}, @IPVS_SVC_ATTR_TIMEOUT={0x0, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0x0, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x0, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x9}]}, 0xfffffffffffffe9b}, 0x1, 0x0, 0x0, 0x8880}, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) (async) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES16=0x0, @ANYRESOCT=r2, @ANYBLOB], 0x68}}, 0x40000c4) (async) 14:40:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x80, 0x3f, 0x10, @mcast2, @mcast2, 0x700, 0x700, 0x7, 0x81}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48400014}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x48, r0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004041}, 0x44804) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=[0x8, 0xffff, 0xf96c, 0xfffb, 0x7, 0x22, 0x4, 0x5cc, 0x4, 0xc5d]) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01000000000000000000040000000c000000000000000000000000060400000000000000988e94d86595b939"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (rerun: 32) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xefffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x3, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x5f, 0x6f, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000080)=""/208, 0x33, 0xd0, 0x1}, 0x20) 14:40:14 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x80, 0x3f, 0x10, @mcast2, @mcast2, 0x700, 0x700, 0x7, 0x81}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48400014}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x48, r0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004041}, 0x44804) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=[0x8, 0xffff, 0xf96c, 0xfffb, 0x7, 0x22, 0x4, 0x5cc, 0x4, 0xc5d]) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01000000000000000000040000000c000000000000000000000000060400000000000000988e94d86595b939"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x2f, 0x5, 0x80, 0x3f, 0x10, @mcast2, @mcast2, 0x700, 0x700, 0x7, 0x81}}) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48400014}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x48, r0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004041}, 0x44804) (async) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)=[0x8, 0xffff, 0xf96c, 0xfffb, 0x7, 0x22, 0x4, 0x5cc, 0x4, 0xc5d]) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01000000000000000000040000000c000000000000000000000000060400000000000000988e94d86595b939"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 3: syz_clone(0xc08ab000, 0x0, 0xe403000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000c0000000300000000000000107569d6f0000006000000000000cd13f7fc908bbc4c1e606ff75c60f641ed243649dcf8ac4baf02bf1f9908eebcbd121f555b6cabf2395c502a9c560d0beb1480cfae61"], &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x4, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x2, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x5f, 0x6f, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000080)=""/208, 0x33, 0xd0, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x5, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000c0000000300000000000000107569d6f0000006000000000000cd13f7fc908bbc4c1e606ff75c60f641ed243649dcf8ac4baf02bf1f9908eebcbd121f555b6cabf2395c502a9c560d0beb1480cfae61"], &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000c0000000300000000000000107569d6f0000006000000000000cd13f7fc908bbc4c1e606ff75c60f641ed243649dcf8ac4baf02bf1f9908eebcbd121f555b6cabf2395c502a9c560d0beb1480cfae61"], &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) (async) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf003000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x73, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x5f, 0x6f, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000080)=""/208, 0x33, 0xd0, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x3, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000c0000000300000000000000107569d6f0000006000000000000cd13f7fc908bbc4c1e606ff75c60f641ed243649dcf8ac4baf02bf1f9908eebcbd121f555b6cabf2395c502a9c560d0beb1480cfae61"], &(0x7f0000000240)=""/198, 0x27, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x6, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: syz_clone(0xc08ab000, 0x0, 0xe003000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000040)=""/181, 0xb5, 0x0, 0x0, 0x0) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000040)=""/181, 0xb5, 0x0, 0x0, 0x0) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x4, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x7, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: r0 = socket(0x5, 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="8e4c08fa4d16c400d15dfa5e04f0371c0000005372c8e10970350137a2b0d5d98a3cfa1fd9f9009fcc99f551f855108a8dedb6b5e992f14dd7f0c6", @ANYRES16=r1, @ANYBLOB="eaff28bd7000fcdbdf2508000000051f2a0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x800) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0c8f98000200000000000000000000060403000000da43513d54eb0b48544c"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000040)=""/181, 0xb5, 0x0, 0x0, 0x0) 14:40:14 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf0ffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x8, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000ff160cce0000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: r0 = socket(0x5, 0x2, 0x0) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="8e4c08fa4d16c400d15dfa5e04f0371c0000005372c8e10970350137a2b0d5d98a3cfa1fd9f9009fcc99f551f855108a8dedb6b5e992f14dd7f0c6", @ANYRES16=r1, @ANYBLOB="eaff28bd7000fcdbdf2508000000051f2a0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x800) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0c8f98000200000000000000000000060403000000da43513d54eb0b48544c"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6, 0x1}, 0x20) 14:40:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x9, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000ff160cce0000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x6, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x7, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:14 executing program 1: r0 = socket(0x5, 0x2, 0x0) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="8e4c08fa4d16c400d15dfa5e04f0371c0000005372c8e10970350137a2b0d5d98a3cfa1fd9f9009fcc99f551f855108a8dedb6b5e992f14dd7f0c6", @ANYRES16=r1, @ANYBLOB="eaff28bd7000fcdbdf2508000000051f2a0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x800) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0c8f98000200000000000000000000060403000000da43513d54eb0b48544c"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000200000000000000010000060400000005000000ff160cce0000"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf203000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xa, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x8, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000080)=""/198, 0x2f, 0xc6, 0x1}, 0xba) 14:40:15 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9f090000180057506b0c00002c0000fa27b78b4eb99e57000800000206040000000000000000", @ANYRES32=r0, @ANYRES16=r1, @ANYRESOCT=r1], &(0x7f0000000040)=""/206, 0x26, 0xce, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x9, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000080)=""/198, 0x2f, 0xc6, 0x1}, 0xba) 14:40:15 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) (async) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) (async) setsockopt$inet6_dccp_int(r2, 0x21, 0xa, &(0x7f0000000000)=0x5, 0x4) (async) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9f090000180057506b0c00002c0000fa27b78b4eb99e57000800000206040000000000000000", @ANYRES32=r0, @ANYRES16=r1, @ANYRESOCT=r1], &(0x7f0000000040)=""/206, 0x26, 0xce, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xb, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xa, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, 0x0, 0x0) (async) setsockopt$inet6_dccp_int(r2, 0x21, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9f090000180057506b0c00002c0000fa27b78b4eb99e57000800000206040000000000000000", @ANYRES32=r0, @ANYRES16=r1, @ANYRESOCT=r1], &(0x7f0000000040)=""/206, 0x26, 0xce, 0x1}, 0x20) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf403000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xc, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000080)=""/198, 0x2f, 0xc6, 0x1}, 0xba) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xb, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: getpgrp(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000c0000000200000000000000000000060400000000005f6185c12af05558df99544be512f575fae15cbefabb26136df85ab0dcee1260a0c0145bb413532aca40bc8226ab2834f5300f338b08e37b5dfdff9ea8a0ab913977f346eb6adf593597643fa3e6f0e27623b4c5e00c0e171b45ff919ae52b79540300000071497bcad699d33df524a723f19d0000000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xd, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: getpgrp(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000c0000000200000000000000000000060400000000005f6185c12af05558df99544be512f575fae15cbefabb26136df85ab0dcee1260a0c0145bb413532aca40bc8226ab2834f5300f338b08e37b5dfdff9ea8a0ab913977f346eb6adf593597643fa3e6f0e27623b4c5e00c0e171b45ff919ae52b79540300000071497bcad699d33df524a723f19d0000000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) getpgrp(0xffffffffffffffff) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000c0000000200000000000000000000060400000000005f6185c12af05558df99544be512f575fae15cbefabb26136df85ab0dcee1260a0c0145bb413532aca40bc8226ab2834f5300f338b08e37b5dfdff9ea8a0ab913977f346eb6adf593597643fa3e6f0e27623b4c5e00c0e171b45ff919ae52b79540300000071497bcad699d33df524a723f19d0000000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000040)=[@exit_looper], 0xb5, 0x0, &(0x7f0000000080)="be4003136ec22032362425cd53813b2dfb44f6c249b1ee0a41789844a305112191dea5b3a445b42d6d96a668f6719a07cb35f14ac61dfae5ebed03511abf6eb4b9ab022caa69e2e9d43fb16072a87879d8835333ad10a447e9ace9c739aa1ee3e6cbed9d72938fa0d10716aa7ca50dd1c5a5fc37c4b9464a60ab4cd1c6b9f615edecb442da8587d7887902e468baa5025c539f7668e9e757cbecf7efb4818562e5f0d10b91ec568bc36757eeecdb118e543afb941b"}) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xc, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: getpgrp(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000c0000000200000000000000000000060400000000005f6185c12af05558df99544be512f575fae15cbefabb26136df85ab0dcee1260a0c0145bb413532aca40bc8226ab2834f5300f338b08e37b5dfdff9ea8a0ab913977f346eb6adf593597643fa3e6f0e27623b4c5e00c0e171b45ff919ae52b79540300000071497bcad699d33df524a723f19d0000000000"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xd, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000040)=[@exit_looper], 0xb5, 0x0, &(0x7f0000000080)="be4003136ec22032362425cd53813b2dfb44f6c249b1ee0a41789844a305112191dea5b3a445b42d6d96a668f6719a07cb35f14ac61dfae5ebed03511abf6eb4b9ab022caa69e2e9d43fb16072a87879d8835333ad10a447e9ace9c739aa1ee3e6cbed9d72938fa0d10716aa7ca50dd1c5a5fc37c4b9464a60ab4cd1c6b9f615edecb442da8587d7887902e468baa5025c539f7668e9e757cbecf7efb4818562e5f0d10b91ec568bc36757eeecdb118e543afb941b"}) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000040)=[@exit_looper], 0xb5, 0x0, &(0x7f0000000080)="be4003136ec22032362425cd53813b2dfb44f6c249b1ee0a41789844a305112191dea5b3a445b42d6d96a668f6719a07cb35f14ac61dfae5ebed03511abf6eb4b9ab022caa69e2e9d43fb16072a87879d8835333ad10a447e9ace9c739aa1ee3e6cbed9d72938fa0d10716aa7ca50dd1c5a5fc37c4b9464a60ab4cd1c6b9f615edecb442da8587d7887902e468baa5025c539f7668e9e757cbecf7efb4818562e5f0d10b91ec568bc36757eeecdb118e543afb941b"}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) (async) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xe, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xe, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: io_uring_setup(0x6543, &(0x7f0000000100)={0x0, 0x42b, 0x2, 0x0, 0xe9}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x21}, {0x0, [0x2e, 0x61, 0x30, 0x61, 0x2e, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x10, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x10, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:15 executing program 1: io_uring_setup(0x6543, &(0x7f0000000100)={0x0, 0x42b, 0x2, 0x0, 0xe9}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x21}, {0x0, [0x2e, 0x61, 0x30, 0x61, 0x2e, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000040)=[@exit_looper], 0xb5, 0x0, &(0x7f0000000080)="be4003136ec22032362425cd53813b2dfb44f6c249b1ee0a41789844a305112191dea5b3a445b42d6d96a668f6719a07cb35f14ac61dfae5ebed03511abf6eb4b9ab022caa69e2e9d43fb16072a87879d8835333ad10a447e9ace9c739aa1ee3e6cbed9d72938fa0d10716aa7ca50dd1c5a5fc37c4b9464a60ab4cd1c6b9f615edecb442da8587d7887902e468baa5025c539f7668e9e757cbecf7efb4818562e5f0d10b91ec568bc36757eeecdb118e543afb941b"}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1518.886781][T11385] ================================================================== [ 1518.886807][T11385] BUG: KCSAN: data-race in io_sq_thread / io_sq_thread_park [ 1518.886829][T11385] [ 1518.886834][T11385] write to 0xffff888138135038 of 8 bytes by task 7779 on cpu 1: [ 1518.886851][T11385] io_sq_thread+0xa2a/0xac0 [ 1518.886868][T11385] ret_from_fork+0x1f/0x30 [ 1518.886888][T11385] [ 1518.886893][T11385] read to 0xffff888138135038 of 8 bytes by task 11385 on cpu 0: [ 1518.886909][T11385] io_sq_thread_park+0x17/0x70 [ 1518.886927][T11385] io_ring_exit_work+0xa5/0x3cb [ 1518.886948][T11385] process_one_work+0x3d3/0x720 [ 1518.886972][T11385] worker_thread+0x618/0xa70 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf603000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x11, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x11, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: io_uring_setup(0x6543, &(0x7f0000000100)={0x0, 0x42b, 0x2, 0x0, 0xe9}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x21}, {0x0, [0x2e, 0x61, 0x30, 0x61, 0x2e, 0x2e, 0x30, 0x61]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000000)=0x200) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x12, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) [ 1518.886993][T11385] kthread+0x1a9/0x1e0 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000000)=0x200) 14:40:15 executing program 1: write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x69, 0x2, {0x0, 0x3, 0x6}}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24000004) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x12, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x1a, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) [ 1518.887009][T11385] ret_from_fork+0x1f/0x30 [ 1518.887028][T11385] [ 1518.887030][T11385] value changed: 0xffff88811d696400 -> 0x0000000000000000 [ 1518.887042][T11385] [ 1518.887044][T11385] Reported by Kernel Concurrency Sanitizer on: 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xf803000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6}, 0x20) (async) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000000)=0x200) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x69, 0x2, {0x0, 0x3, 0x6}}, 0x14) (async, rerun: 64) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24000004) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x1b, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x25, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, 0x0, 0x200, 0x8000, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8801) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80a4}, 0x91) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008000) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x25, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) [ 1518.887050][T11385] CPU: 0 PID: 11385 Comm: kworker/u4:40 Not tainted 5.18.0-syzkaller-13818-gd0e60d46bc03-dirty #0 [ 1518.887073][T11385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.887085][T11385] Workqueue: events_unbound io_ring_exit_work [ 1518.887124][T11385] ================================================================== 14:40:15 executing program 1: write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x69, 0x2, {0x0, 0x3, 0x6}}, 0x14) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24000004) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x69, 0x2, {0x0, 0x3, 0x6}}, 0x14) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24000004) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x48, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x43, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfa03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 4: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, 0x0, 0x200, 0x8000, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8801) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80a4}, 0x91) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, 0x0, 0x200, 0x8000, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8801) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80a4}, 0x91) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008000) (async) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$kcm(0x29, 0x7, 0x0) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x4c, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x48, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$kcm(0x29, 0x7, 0x0) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x4c, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x68, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, 0x0, 0x200, 0x8000, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8801) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80a4}, 0x91) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008000) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, 0x0, 0x200, 0x8000, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x8801) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80a4}, 0x91) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x3c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008000) (async) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) socket$kcm(0x29, 0x7, 0x0) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x68, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x6c, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4000, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x5}]}]}}, &(0x7f0000000240)=""/188, 0x2e, 0xbc, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x271}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000200)=0x9) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4000, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x5}]}]}}, &(0x7f0000000240)=""/188, 0x2e, 0xbc, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x74, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x6c, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x7a, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x74, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc00000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x4000, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x5}]}]}}, &(0x7f0000000240)=""/188, 0x2e, 0xbc, 0x1}, 0x20) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x271}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000200)=0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x271}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) (async) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000200)=0x9) (async) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6}, 0x20) 14:40:15 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="68000000e96d56f7ff7426d37f68ea66958b187f457d4afa8eaa493fd7f9b07e8bf5f8f7abb9f8905ea380e84d57804282732e70bc38ec9ab6b712ba4212f833e5d8b483f083829aad718e46fbf8e8f9b14bdce567d9cee729b876018471149e53b525f5114452406014ce79f50cbcc49a18a3db77797203bbeb77f93a63287b2ae48d683eb3edf6427e3f988891a0481ca5bad14a5ef506038482268a44827c58c13e2da115762bc1", @ANYRES16=r1, @ANYBLOB="01002cbd7000ffdbdf250200000008000400f7ffffff2800038005000800f000000014000600fe8800000000000000000000000000010800050000000000240002800800090001000100080007000300000006000e004e20000008000800ffffffff"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/247, 0xf7, 0x0, &(0x7f0000000340)=""/203, 0xcb}}, 0x10) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x92, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x271}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) (async) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f0000000200)=0x9) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x7a, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0xc5, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0xc5, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="68000000e96d56f7ff7426d37f68ea66958b187f457d4afa8eaa493fd7f9b07e8bf5f8f7abb9f8905ea380e84d57804282732e70bc38ec9ab6b712ba4212f833e5d8b483f083829aad718e46fbf8e8f9b14bdce567d9cee729b876018471149e53b525f5114452406014ce79f50cbcc49a18a3db77797203bbeb77f93a63287b2ae48d683eb3edf6427e3f988891a0481ca5bad14a5ef506038482268a44827c58c13e2da115762bc1", @ANYRES16=r1, @ANYBLOB="01002cbd7000ffdbdf250200000008000400f7ffffff2800038005000800f000000014000600fe8800000000000000000000000000010800050000000000240002800800090001000100080007000300000006000e004e20000008000800ffffffff"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/247, 0xf7, 0x0, &(0x7f0000000340)=""/203, 0xcb}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="68000000e96d56f7ff7426d37f68ea66958b187f457d4afa8eaa493fd7f9b07e8bf5f8f7abb9f8905ea380e84d57804282732e70bc38ec9ab6b712ba4212f833e5d8b483f083829aad718e46fbf8e8f9b14bdce567d9cee729b876018471149e53b525f5114452406014ce79f50cbcc49a18a3db77797203bbeb77f93a63287b2ae48d683eb3edf6427e3f988891a0481ca5bad14a5ef506038482268a44827c58c13e2da115762bc1", @ANYRES16=r1, @ANYBLOB="01002cbd7000ffdbdf250200000008000400f7ffffff2800038005000800f000000014000600fe8800000000000000000000000000010800050000000000240002800800090001000100080007000300000006000e004e20000008000800ffffffff"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/247, 0xf7, 0x0, &(0x7f0000000340)=""/203, 0xcb}}, 0x10) (async) 14:40:15 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfc03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:15 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb206595e1a966010018000000000000000c0000000c000100020773250258c1b2e49eaeb10000000000000000000006"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x1000000, 0xc6}, 0x20) 14:40:15 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="68000000e96d56f7ff7426d37f68ea66958b187f457d4afa8eaa493fd7f9b07e8bf5f8f7abb9f8905ea380e84d57804282732e70bc38ec9ab6b712ba4212f833e5d8b483f083829aad718e46fbf8e8f9b14bdce567d9cee729b876018471149e53b525f5114452406014ce79f50cbcc49a18a3db77797203bbeb77f93a63287b2ae48d683eb3edf6427e3f988891a0481ca5bad14a5ef506038482268a44827c58c13e2da115762bc1", @ANYRES16=r1, @ANYBLOB="01002cbd7000ffdbdf250200000008000400f7ffffff2800038005000800f000000014000600fe8800000000000000000000000000010800050000000000240002800800090001000100080007000300000006000e004e20000008000800ffffffff"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40011) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000040)=""/247, 0xf7, 0x0, &(0x7f0000000340)=""/203, 0xcb}}, 0x10) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:15 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb206595e1a966010018000000000000000c0000000c000100020773250258c1b2e49eaeb10000000000000000000006"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x1}, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb206595e1a966010018000000000000000c0000000c000100020773250258c1b2e49eaeb10000000000000000000006"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) 14:40:15 executing program 4: socket(0x28, 0xa, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x2, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x48, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x2]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x3, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfe03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 3: syz_clone(0xc08ab000, 0x0, 0xf603000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 4: socket(0x28, 0xa, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb206595e1a966010018000000000000000c0000000c000100020773250258c1b2e49eaeb10000000000000000000006"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x1}, 0x8) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb206595e1a966010018000000000000000c0000000c000100020773250258c1b2e49eaeb10000000000000000000006"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x3]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x4, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x4]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x5, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: socket(0x28, 0xa, 0x2) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) socket$kcm(0x29, 0xb, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18, 0xd, 0x2, {{0x20, 0x3, 0x4}, 0x9}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x4, [@datasec={0xa, 0x7, 0x0, 0xf, 0x2, [{0x3, 0x1e9, 0x2}, {0x3, 0x20000000, 0x8}, {0x5, 0x7, 0x7}, {0x1, 0x5, 0x3}, {0x2, 0x10, 0x80}, {0x2, 0xaa, 0x1}, {0x5, 0x0, 0x200}], "f8e0"}, @var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}, @var={0x9, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x2, 0x7, 0x0, 0xf, 0x3, [{0x5, 0x80000001, 0x82d}, {0x1, 0x3}, {0x5, 0x0, 0x5}, {0x5, 0xfd4, 0x101}, {0x4, 0x7ff, 0x84}, {0x4, 0x2}, {0x5, 0x100, 0xa21298bd}], "2be711"}]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000000180)=""/13, 0x104, 0xd, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) socket$kcm(0x29, 0xb, 0x0) (async) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18, 0xd, 0x2, {{0x20, 0x3, 0x4}, 0x9}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x4, [@datasec={0xa, 0x7, 0x0, 0xf, 0x2, [{0x3, 0x1e9, 0x2}, {0x3, 0x20000000, 0x8}, {0x5, 0x7, 0x7}, {0x1, 0x5, 0x3}, {0x2, 0x10, 0x80}, {0x2, 0xaa, 0x1}, {0x5, 0x0, 0x200}], "f8e0"}, @var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}, @var={0x9, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x2, 0x7, 0x0, 0xf, 0x3, [{0x5, 0x80000001, 0x82d}, {0x1, 0x3}, {0x5, 0x0, 0x5}, {0x5, 0xfd4, 0x101}, {0x4, 0x7ff, 0x84}, {0x4, 0x2}, {0x5, 0x100, 0xa21298bd}], "2be711"}]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000000180)=""/13, 0x104, 0xd, 0x1}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9ff8e7e62c46a58209024cea94e475b1dbd6a3a6fdd46dd9314db5dd416b9a0c158ca8b54a2549acc807201b4cf102fbdba4bdc5431d11d9cc5f5398953c50685536b025b17b9373393f890c1a9838298c831af6639b58f2e9c04f122c5227b48e77b0b5ad032767506f1f449d94c69e2d57befcc51333fbc72c241f195e4bd51fac93857436610169da660b18152955652fcea987f3fbc973325e94ddebc8efb6b03783bbcf2c98276c706765efcba14633db26e547c362a19e9a5a9e4ccbe868b49923faffffffffffffff2f", @ANYRESHEX=0x0], &(0x7f0000000040)=""/190, 0x26, 0xbe, 0x1}, 0x20) 14:40:16 executing program 3: syz_clone(0xc08ab000, 0x0, 0xfe03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x6, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x6]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) socket$kcm(0x29, 0xb, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18, 0xd, 0x2, {{0x20, 0x3, 0x4}, 0x9}}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x4, [@datasec={0xa, 0x7, 0x0, 0xf, 0x2, [{0x3, 0x1e9, 0x2}, {0x3, 0x20000000, 0x8}, {0x5, 0x7, 0x7}, {0x1, 0x5, 0x3}, {0x2, 0x10, 0x80}, {0x2, 0xaa, 0x1}, {0x5, 0x0, 0x200}], "f8e0"}, @var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}, @var={0x9, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x2, 0x7, 0x0, 0xf, 0x3, [{0x5, 0x80000001, 0x82d}, {0x1, 0x3}, {0x5, 0x0, 0x5}, {0x5, 0xfd4, 0x101}, {0x4, 0x7ff, 0x84}, {0x4, 0x2}, {0x5, 0x100, 0xa21298bd}], "2be711"}]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000000180)=""/13, 0x104, 0xd, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) (async) socket$kcm(0x29, 0xb, 0x0) (async) write$P9_RLOPEN(r0, &(0x7f0000000380)={0x18, 0xd, 0x2, {{0x20, 0x3, 0x4}, 0x9}}, 0x18) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe5, 0xe5, 0x4, [@datasec={0xa, 0x7, 0x0, 0xf, 0x2, [{0x3, 0x1e9, 0x2}, {0x3, 0x20000000, 0x8}, {0x5, 0x7, 0x7}, {0x1, 0x5, 0x3}, {0x2, 0x10, 0x80}, {0x2, 0xaa, 0x1}, {0x5, 0x0, 0x200}], "f8e0"}, @var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}, @var={0x9, 0x0, 0x0, 0xe, 0x5, 0x1}, @datasec={0x2, 0x7, 0x0, 0xf, 0x3, [{0x5, 0x80000001, 0x82d}, {0x1, 0x3}, {0x5, 0x0, 0x5}, {0x5, 0xfd4, 0x101}, {0x4, 0x7ff, 0x84}, {0x4, 0x2}, {0x5, 0x100, 0xa21298bd}], "2be711"}]}, {0x0, [0x2e, 0x2e]}}, &(0x7f0000000180)=""/13, 0x104, 0xd, 0x1}, 0x20) (async) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9ff8e7e62c46a58209024cea94e475b1dbd6a3a6fdd46dd9314db5dd416b9a0c158ca8b54a2549acc807201b4cf102fbdba4bdc5431d11d9cc5f5398953c50685536b025b17b9373393f890c1a9838298c831af6639b58f2e9c04f122c5227b48e77b0b5ad032767506f1f449d94c69e2d57befcc51333fbc72c241f195e4bd51fac93857436610169da660b18152955652fcea987f3fbc973325e94ddebc8efb6b03783bbcf2c98276c706765efcba14633db26e547c362a19e9a5a9e4ccbe868b49923faffffffffffffff2f", @ANYRESHEX=0x0], &(0x7f0000000040)=""/190, 0x26, 0xbe, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x7]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x7, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0xffffffff}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9ff8e7e62c46a58209024cea94e475b1dbd6a3a6fdd46dd9314db5dd416b9a0c158ca8b54a2549acc807201b4cf102fbdba4bdc5431d11d9cc5f5398953c50685536b025b17b9373393f890c1a9838298c831af6639b58f2e9c04f122c5227b48e77b0b5ad032767506f1f449d94c69e2d57befcc51333fbc72c241f195e4bd51fac93857436610169da660b18152955652fcea987f3fbc973325e94ddebc8efb6b03783bbcf2c98276c706765efcba14633db26e547c362a19e9a5a9e4ccbe868b49923faffffffffffffff2f", @ANYRESHEX=0x0], &(0x7f0000000040)=""/190, 0x26, 0xbe, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9ff8e7e62c46a58209024cea94e475b1dbd6a3a6fdd46dd9314db5dd416b9a0c158ca8b54a2549acc807201b4cf102fbdba4bdc5431d11d9cc5f5398953c50685536b025b17b9373393f890c1a9838298c831af6639b58f2e9c04f122c5227b48e77b0b5ad032767506f1f449d94c69e2d57befcc51333fbc72c241f195e4bd51fac93857436610169da660b18152955652fcea987f3fbc973325e94ddebc8efb6b03783bbcf2c98276c706765efcba14633db26e547c362a19e9a5a9e4ccbe868b49923faffffffffffffff2f", @ANYRESHEX=0x0], &(0x7f0000000040)=""/190, 0x26, 0xbe, 0x1}, 0x20) (async) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x8, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: r0 = msgget(0x0, 0x81) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x80000001}, 0x8) r1 = msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x80) msgsnd(r2, &(0x7f0000000040)={0x3, "c7b4395810f57be72954fc3a9ab99bed89cca687672aaf01dfc4a228349125605200cef69cf39fe4a4cc1b297b8dd1500bc427dd3a457aa9e4983e7dd2bb79256bbdc14bf04538c051297de241b3520700b6209917a3"}, 0x5e, 0x0) msgsnd(r1, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000000c0)=""/72) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0xffffffff}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x9, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x8]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: r0 = msgget(0x0, 0x81) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x80000001}, 0x8) r1 = msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x80) msgsnd(r2, &(0x7f0000000040)={0x3, "c7b4395810f57be72954fc3a9ab99bed89cca687672aaf01dfc4a228349125605200cef69cf39fe4a4cc1b297b8dd1500bc427dd3a457aa9e4983e7dd2bb79256bbdc14bf04538c051297de241b3520700b6209917a3"}, 0x5e, 0x0) msgsnd(r1, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000000c0)=""/72) msgget(0x0, 0x81) (async) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/32) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x80000001}, 0x8) (async) msgget$private(0x0, 0x0) (async) msgget$private(0x0, 0x80) (async) msgsnd(r2, &(0x7f0000000040)={0x3, "c7b4395810f57be72954fc3a9ab99bed89cca687672aaf01dfc4a228349125605200cef69cf39fe4a4cc1b297b8dd1500bc427dd3a457aa9e4983e7dd2bb79256bbdc14bf04538c051297de241b3520700b6209917a3"}, 0x5e, 0x0) (async) msgsnd(r1, &(0x7f00000000c0)={0x2}, 0x8, 0x0) (async) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000000c0)=""/72) (async) 14:40:16 executing program 3: syz_clone(0xc08ab000, 0x0, 0xfe03000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xff8f000000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0xffffffff}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xa, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x9]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: r0 = msgget(0x0, 0x81) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/32) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x80000001}, 0x8) r1 = msgget$private(0x0, 0x0) (async) r2 = msgget$private(0x0, 0x80) msgsnd(r2, &(0x7f0000000040)={0x3, "c7b4395810f57be72954fc3a9ab99bed89cca687672aaf01dfc4a228349125605200cef69cf39fe4a4cc1b297b8dd1500bc427dd3a457aa9e4983e7dd2bb79256bbdc14bf04538c051297de241b3520700b6209917a3"}, 0x5e, 0x0) (async) msgsnd(r1, &(0x7f00000000c0)={0x2}, 0x8, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000000c0)=""/72) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xb, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xa]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000040002000000000000000100000604060000050000000000000000008caad06bfb9a7e1ad3abe4f92dd4b3aa7253666304a37e10fb835fb359d4c21e10252dd01e13c8881d7fc0742aeb1ab88b97cfc84fd14c82b8fe94fb3cb7a325"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xb]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x8}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000040002000000000000000100000604060000050000000000000000008caad06bfb9a7e1ad3abe4f92dd4b3aa7253666304a37e10fb835fb359d4c21e10252dd01e13c8881d7fc0742aeb1ab88b97cfc84fd14c82b8fe94fb3cb7a325"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xc, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xc]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffff030000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xd]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000140000040002000000000000000100000604060000050000000000000000008caad06bfb9a7e1ad3abe4f92dd4b3aa7253666304a37e10fb835fb359d4c21e10252dd01e13c8881d7fc0742aeb1ab88b97cfc84fd14c82b8fe94fb3cb7a325"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xd, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x4f, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/33, 0x23, 0x21, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000100)=""/58, 0x3a) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002135c5dc1d90000000000000400"/43], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xe, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x8}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xe]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x10, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x4f, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/33, 0x23, 0x21, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000100)=""/58, 0x3a) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x10]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffff1f0000000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002135c5dc1d90000000000000400"/43], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x8}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x11, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x4f, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/33, 0x23, 0x21, 0x1}, 0x20) (async, rerun: 64) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000100)=""/58, 0x3a) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x11]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002135c5dc1d90000000000000400"/43], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002135c5dc1d90000000000000400"/43], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x12, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) r1 = semget$private(0x0, 0x1, 0x40) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000040)=""/221) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000480)=""/147) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000200)={&(0x7f0000000140)=""/126, 0x7e, 0x0, &(0x7f0000000340)=""/211, 0xd3}}, 0x10) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x12]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x1b, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) (async) r1 = semget$private(0x0, 0x1, 0x40) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000040)=""/221) (async, rerun: 32) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000480)=""/147) (rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000200)={&(0x7f0000000140)=""/126, 0x7e, 0x0, &(0x7f0000000340)=""/211, 0xd3}}, 0x10) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100188d26000000000014000000140000000200000000000000010600000000000005000000000000000000152f2a480c7afe2a0e9f37a41d99d30b8f8af7c336b87b56f71ded93d77d732517f318feb935e303da7227bb0d23db73ef28d48a78b1034268be3b7bab57223b1adc89d86fca9ea262576650990fd447a5049be4b90957e1bb0d70f8b2c15ded311fbad6cfe80135cf5366e0a8ba7f31e39e59e61e88fd8e5620792045e5f4ca04efe26052faa407036cb8fa04b258da5e121f918c417fb3e68a"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x1a]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x25]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x8}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100188d26000000000014000000140000000200000000000000010600000000000005000000000000000000152f2a480c7afe2a0e9f37a41d99d30b8f8af7c336b87b56f71ded93d77d732517f318feb935e303da7227bb0d23db73ef28d48a78b1034268be3b7bab57223b1adc89d86fca9ea262576650990fd447a5049be4b90957e1bb0d70f8b2c15ded311fbad6cfe80135cf5366e0a8ba7f31e39e59e61e88fd8e5620792045e5f4ca04efe26052faa407036cb8fa04b258da5e121f918c417fb3e68a"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x25, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000240)=""/198, 0x1a, 0xc6, 0x1}, 0x20) (async, rerun: 64) r1 = semget$private(0x0, 0x1, 0x40) (rerun: 64) semctl$SEM_STAT_ANY(r1, 0x2, 0x14, &(0x7f0000000040)=""/221) (async) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000480)=""/147) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000200)={&(0x7f0000000140)=""/126, 0x7e, 0x0, &(0x7f0000000340)=""/211, 0xd3}}, 0x10) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x48]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x43, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100188d26000000000014000000140000000200000000000000010600000000000005000000000000000000152f2a480c7afe2a0e9f37a41d99d30b8f8af7c336b87b56f71ded93d77d732517f318feb935e303da7227bb0d23db73ef28d48a78b1034268be3b7bab57223b1adc89d86fca9ea262576650990fd447a5049be4b90957e1bb0d70f8b2c15ded311fbad6cfe80135cf5366e0a8ba7f31e39e59e61e88fd8e5620792045e5f4ca04efe26052faa407036cb8fa04b258da5e121f918c417fb3e68a"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100188d26000000000014000000140000000200000000000000010600000000000005000000000000000000152f2a480c7afe2a0e9f37a41d99d30b8f8af7c336b87b56f71ded93d77d732517f318feb935e303da7227bb0d23db73ef28d48a78b1034268be3b7bab57223b1adc89d86fca9ea262576650990fd447a5049be4b90957e1bb0d70f8b2c15ded311fbad6cfe80135cf5366e0a8ba7f31e39e59e61e88fd8e5620792045e5f4ca04efe26052faa407036cb8fa04b258da5e121f918c417fb3e68a"], &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) (async) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x4c]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x80, 0x0, 0x6}}, 0x14) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x0, 0x1}}, 0x14) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x48, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x80, 0x0, 0x6}}, 0x14) (async) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x0, 0x1}}, 0x14) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) 14:40:16 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x2, 0x2, 0x7}, 0x3}}, 0x18) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x68]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x4c, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x80, 0x0, 0x6}}, 0x14) (async) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x0, 0x1}}, 0x14) 14:40:16 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async, rerun: 64) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x2, 0x2, 0x7}, 0x3}}, 0x18) (rerun: 64) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x6c]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x74]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x68, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:16 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async, rerun: 32) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x2, 0x2, 0x7}, 0x3}}, 0x18) (rerun: 32) 14:40:16 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21042}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1a71c156}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x44004844) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x84, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd4f}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x20000804) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc845}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000040)=""/207, 0x26, 0xcf, 0x1}, 0x20) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$P9_RAUTH(r1, &(0x7f00000006c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x5}}, 0x14) 14:40:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x6c, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpid() (async) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) socket(0x2c, 0x1, 0x0) (async) sendmsg$802154_raw(r0, 0x0, 0x0) (async) getpgrp(0x0) (async) 14:40:17 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21042}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1a71c156}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x44004844) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x84, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd4f}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x20000804) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc845}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000040)=""/207, 0x26, 0xcf, 0x1}, 0x20) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$P9_RAUTH(r1, &(0x7f00000006c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x5}}, 0x14) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21042}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1a71c156}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x44004844) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x84, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd4f}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x20000804) (async) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc845}, 0x40000) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000040)=""/207, 0x26, 0xcf, 0x1}, 0x20) (async) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$P9_RAUTH(r1, &(0x7f00000006c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x5}}, 0x14) (async) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x7a]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bond\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x30}}, 0x24004800) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x74, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6}, 0x20) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0xc5]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x7a, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21042}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1a71c156}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x44004844) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x84, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd4f}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x20000804) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc845}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000040)=""/207, 0x26, 0xcf, 0x1}, 0x20) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$P9_RAUTH(r1, &(0x7f00000006c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x5}}, 0x14) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21042}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x8c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1a71c156}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x44004844) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x84, r0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xd4f}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x84}, 0x1, 0x0, 0x0, 0x50}, 0x20000804) (async) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x13, 0x1, 'bridge_slave_1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast1}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0xc845}, 0x40000) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f0000000040)=""/207, 0x26, 0xcf, 0x1}, 0x20) (async) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$P9_RAUTH(r1, &(0x7f00000006c0)={0x14, 0x67, 0x2, {0x4, 0x0, 0x5}}, 0x14) (async) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bond\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x30}}, 0x24004800) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bond\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x30}}, 0x24004800) (async) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 3: syz_clone(0xc08ab000, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x2}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x92, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x619, &(0x7f0000000080)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x20, 0x2, 0x2}}, 0x14) 14:40:17 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpid() (async) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = socket(0x2c, 0x1, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bond\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x30}}, 0x24004800) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f00000010c0)={0x14, r2, 0x913}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_bond\x00'}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x30}}, 0x24004800) (async) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0xc5, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x619, &(0x7f0000000080)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x20, 0x2, 0x2}}, 0x14) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x619, &(0x7f0000000080)) (async) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x20, 0x2, 0x2}}, 0x14) (async) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x3}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80c80) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x84, 0x3, 0x3}}, 0x14) 14:40:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x619, &(0x7f0000000080)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x20, 0x2, 0x2}}, 0x14) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x4}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x5f, 0x0, 0x30, 0x61, 0x4f, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/33, 0x23, 0x21, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000100)=""/58, 0x3a) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80c80) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x84, 0x3, 0x3}}, 0x14) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000040)=""/187) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) getpeername$l2tp(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, &(0x7f0000000440)=0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x8, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x8c, r3, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x5}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x6}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x2, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80c80) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x84, 0x3, 0x3}}, 0x14) 14:40:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000040)=""/187) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) getpeername$l2tp(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, &(0x7f0000000440)=0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x8, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x8c, r3, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x5f5e0ff, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x3, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x7}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 4: shmget$private(0x0, 0x3000, 0x401, &(0x7f0000ffb000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x24, @short={0x2, 0xffff, 0xffff}}, 0x14, &(0x7f0000000500)={&(0x7f00000004c0)="9c29407c5ea7b508ecc922d9fdc5cdd8ad1afc5b3f88f1ea376255", 0x1b}, 0x1, 0x0, 0x0, 0x40001}, 0x48000) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x8c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdd6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb1d0}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfe}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x24040880) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008001}, 0x8010) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xec}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x10) 14:40:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000040)=""/187) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) getpeername$l2tp(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, &(0x7f0000000440)=0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x8, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x8c, r3, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) (async) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000040)=""/187) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) (async) getpeername$l2tp(r0, &(0x7f0000000400)={0x2, 0x0, @broadcast}, &(0x7f0000000440)=0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000740), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b00)={0x40, r3, 0x8, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x0) (async) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x8c, r3, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40) (async) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x5f5e0ff, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x4, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 4: shmget$private(0x0, 0x3000, 0x401, &(0x7f0000ffb000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x24, @short={0x2, 0xffff, 0xffff}}, 0x14, &(0x7f0000000500)={&(0x7f00000004c0)="9c29407c5ea7b508ecc922d9fdc5cdd8ad1afc5b3f88f1ea376255", 0x1b}, 0x1, 0x0, 0x0, 0x40001}, 0x48000) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x8c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdd6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb1d0}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfe}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x24040880) (async) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008001}, 0x8010) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) (async) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xec}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x10) 14:40:17 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpid() (async) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) (async) socket(0x1, 0x5, 0x0) (async) sendmsg$802154_raw(r0, 0x0, 0x0) (async) getpgrp(0x0) (async) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x8}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x5, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x5f5e0ff, 0xc6, 0x1}, 0x20) 14:40:17 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040)=0xffff7fff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$l2tp6(0xa, 0x2, 0x73) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:17 executing program 4: shmget$private(0x0, 0x3000, 0x401, &(0x7f0000ffb000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x24, @short={0x2, 0xffff, 0xffff}}, 0x14, &(0x7f0000000500)={&(0x7f00000004c0)="9c29407c5ea7b508ecc922d9fdc5cdd8ad1afc5b3f88f1ea376255", 0x1b}, 0x1, 0x0, 0x0, 0x40001}, 0x48000) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x8c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdd6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb1d0}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1ff}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfe}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x24040880) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008001}, 0x8010) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xec}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x10) 14:40:17 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040)=0xffff7fff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$l2tp6(0xa, 0x2, 0x73) 14:40:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x6, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0x9}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:17 executing program 1: setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000040)=0xffff7fff, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) socket$l2tp6(0xa, 0x2, 0x73) 14:40:18 executing program 2: syz_clone(0xc08ab000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) (async, rerun: 32) r0 = socket(0x1, 0x5, 0x0) (rerun: 32) sendmsg$802154_raw(r0, 0x0, 0x0) getpgrp(0x0) 14:40:18 executing program 4: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x7, 0x0, 0x61]}}, &(0x7f0000000240)=""/198, 0x33, 0xc6, 0x1}, 0x20) 14:40:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb1200180000000c000000020000000000000000000006046fabcc0004000000f88bb2a27cd6b4e77f4624b88a9b093aa482967eede74f1663e71e935fbb65be1da64c21cf65e2be52795416426697fa647d1bd3de13fe7638fd579773c5d469e0addd1ec4cefdbf4608383ff9d1680977f91baf8e7d9c84714d4c4930bd00a6dd467dd3ba771d5ec084b38eb323f84509e7b512fdb4749c11634c30e1f78c0efe8034d6e53c8a450a39bc655082031cb0fd35c89627878dd497f0f8bd69cface308fbef8f8a5d67e60421ccaf95b8600000000000001b84d9b9b636cbd4e81300e2235bd5f48f0d2375b15ee1942df65e0c4e249536296b5768d9a3f296e6d486ac82763a5ec212e20f00"/283], &(0x7f0000000240)=""/198, 0x26, 0xc6, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)={0x6c, r1, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffff000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x4}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x4c0c1) 14:40:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 14:40:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0xa}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0], 0xb}}, &(0x7f0000000240)=""/198, 0x32, 0xc6, 0x1}, 0x20) 14:40:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000240)=""/198, 0x0, 0xc6, 0x1}, 0x20) 14:40:18 executing program 4: getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}}, &(0x7f0000000240)=""/198, 0x2e, 0xc6, 0x1}, 0x20) 14:40:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLO