10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 22:01:38 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 22:01:38 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 22:01:39 executing program 2: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:39 executing program 2: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 22:01:39 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:39 executing program 2: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 22:01:39 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1b}, 0x48) 22:01:40 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r5, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:40 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:40 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:40 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:41 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:42 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:42 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:42 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:43 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:43 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 702.945925][T27504] device hsr_slave_0 entered promiscuous mode 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:44 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 703.415988][T27504] device hsr_slave_1 entered promiscuous mode 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 703.599384][T27504] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 703.620854][T27504] Cannot create hsr debugfs directory 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:45 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:47 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:47 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:48 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:49 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x0, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0), 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:52 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={0xffffffffffffffff, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x0, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={0xffffffffffffffff, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, 0x0, &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:54 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:55 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={0xffffffffffffffff, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 714.899542][T27431] netdevsim netdevsim4 netdevsim0: renamed from eth0 22:01:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x0, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x0, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:57 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0x0, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x0, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:58 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x0, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:01:59 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x0, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0x0, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 719.003444][T27431] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 719.027618][T27431] netdevsim netdevsim4 netdevsim2: renamed from eth2 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0x0, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 719.223331][T27431] netdevsim netdevsim4 netdevsim3: renamed from eth3 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:00 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x0, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0x0, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0x0, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0x0, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:01 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x0, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x0, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x0, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x0, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x0, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x0, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:02 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:03 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:03 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 721.811710][T27431] 8021q: adding VLAN 0 to HW filter on device bond0 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x0, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 721.852225][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 721.862088][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.873917][T27431] 8021q: adding VLAN 0 to HW filter on device team0 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x0, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 721.921394][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.930139][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.950994][T27687] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.958095][T27687] bridge0: port 1(bridge_slave_0) entered forwarding state 22:02:03 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 722.011172][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x0, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 722.061121][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 722.095262][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 722.119565][T27687] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.126720][T27687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 722.160946][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 722.181228][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 722.215959][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 722.242514][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:02:03 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0x0, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 722.271023][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 722.279810][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0x0, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 722.341489][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 722.349970][T25849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0x0, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r4, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x0, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x0, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:04 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x0, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r4, 0x0, 0xa, &(0x7f0000000980)=[r5, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x0, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x0, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x0, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r4, 0x0, 0xa, &(0x7f0000000980)=[r5, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x0, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r4, 0x0, 0xa, &(0x7f0000000980)=[r5, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:05 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e00)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000b40)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x94}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}}], &(0x7f0000000c00)='GPL\x00', 0x7, 0xe3, &(0x7f0000000c40)=""/227, 0x40f00, 0x1, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x2, 0xb, 0x8, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)=[r9, r2, r1, r9, r9, r8, r1, r7], 0x0, 0x10, 0xec32}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r5, 0x0, 0xa, &(0x7f0000000980)=[r6, r7, r8, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x0, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x0, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x0, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x0, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000fc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000f40)={0x1, 0x80, 0x9, 0x9, 0xff, 0x40, 0x0, 0x6, 0x88002, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000f00), 0x3}, 0x2000, 0x85, 0x8, 0x6, 0x6, 0x6, 0xe89a, 0x0, 0x2, 0x0, 0x1000}, r0, 0xf, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{0x1, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)='%pi6 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e00)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000b40)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x94}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}}], &(0x7f0000000c00)='GPL\x00', 0x7, 0xe3, &(0x7f0000000c40)=""/227, 0x40f00, 0x1, '\x00', r4, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x2, 0xb, 0x8, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0)=[r9, r2, r1, r9, r9, r8, r1, r7], 0x0, 0x10, 0xec32}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r5, 0x0, 0xa, &(0x7f0000000980)=[r6, r7, r8, r9, 0xffffffffffffffff, r10, r11], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x0, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x0, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140), 0x0, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@ifindex=r2, 0x3, 0x1, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440), 0x0}, 0x40) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x40, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x3, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0x1]}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000006c0)={0x5, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@cgroup=r0, r4, 0xc, 0x14, r1, @link_id=r5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x0, r4}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)={@ifindex=r6, r7, 0x14, 0x2000, r4, @prog_fd=r4, r3}, 0x20) r8 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], 0x1, &(0x7f0000000bc0)=[{0x80, 0x4f, 0x5, "7f76318fa197ab9f58b7bfc78d68f17761cd9dbef70241a1d3976d2e08c2fa450e6a27e75f0d994fb387d047a64897acb33a41d8c48ed0adfa7cbfa451b2471b89c7917163df5d5ed4c2d5e9268dbe7855b060651d7d4add1fa9dd75bfef60b11c51da9632ca61e42ccd74b1c6"}, {0x68, 0x0, 0x0, "ea4387435850efa02149f1db1d69ee8e3ee5f471f376bdfefc88fb8b84686c5cd3cadf72d4371626bf7cd17703e68df53750eaa0a26df198d34201b2556a29a6b7576bed8bd8ae17ed29e0f90b817be83e9a123f53b8"}, {0x80, 0x10a, 0xd789, "b575bcc4c0000ed9eb3bcc8b82a104e18ba7913a2a9f0234badedd85458e5abbf6296de10fc7edb2dd1f8e95169e32793edfe7307cab2f789c94297575bb3348af48d78803d67d563f1282a80db64e3929a6d334e0d376bce0d1e4b0a9d386a1d8e1a36224b26fa8fcc2ceb259"}, {0xc0, 0x102, 0x5, "41a79c5fecdc6ab833b5a6175ae3ac38aa5cd879cc55eae8dc9822824ccbf89bcfbb65fa0e0a565ff6963aa9400eefb58f59986c7f2a6818bc9759e38ed1be7a7b828edb9e1a9285a81f9fad64337e734f30cfaca671634d259092f316245e0e10880e1d2892d0c0a4d0d52d3afc07a99d900ad6b73a2e7a3941e38e528e78322f49ee2386fbfc3536e28240cea041d481d0ee5ebd49bc88666bf3956a6c616e79db05633f37f6b8e44d90314c06e3e5"}, {0x88, 0x110, 0x0, "92cca0799d9c711c77ff1f6375d533adc42c26ac1dfdbce4553a54c065ee5af74011916e22e33c57027351417f26f98fa16aef8ca3e609ca608caa5b20611a466099f15ea676a7723a7d0cd331f81d8f6385c257af8f637ce874237aac17b2b0744b680c2ac7c272ee49dcabb248bd9f6e0ca9d989"}, {0x10}], 0x2c0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000010c0), &(0x7f0000001100)=r7}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001200)={r9, 0x58, &(0x7f0000001180)}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000001240), 0x4400, 0x0) ioctl$TUNSETTXFILTER(r10, 0x400454d1, &(0x7f0000001280)={0x1, 0x8, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x28}, @dev, @multicast, @local, @local, @random="90600fccfe98", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote]}) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000001300)={r8}) sendmsg$sock(r8, &(0x7f0000001740)={&(0x7f0000001340)=@vsock={0x28, 0x0, 0x2711}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000013c0)="493a7ca9614628dbd25f7331c61faff10f7486af7596b426f6d89455ec7ad1c572a2760830b2963d08fce81434e81deb9dfe7b37234d871538ad486bba24046be4b8708d3bd6958e07fc2b9b2b02525b1fbab66af36937922498434fa748cca3d1b7ef86c49a4fc2737e6c11f65188f635b5badedc49bcde9d066aa221c6655393048106d0d0f2e6108c7b4ba1288a0e4ed8b76e53ed87edcc50523f500bf66c6e58ec8ce17dee61ad81e8b1db54fbf5d9613f008a4d739a8176f143cefbd35981f6fbfd69490a661d851f3ee51d21d513d9ad8b7cfdcf5de10523b00a77bba52979eebf63c99c45461c40d1a01ddcebd880c53bab", 0xf5}, {&(0x7f00000014c0)="c2bf20c8d37a3b61901c7455fbd98e93110cf61382fdf9d080739a7e3b1f", 0x1e}, {&(0x7f0000001500)="061fa6a670f782f5365e0fbfd1317c9dab40244fb3c1845952251c22533f6d64fcd68d47422d58accf6dc3f4fef8139435420243fd2581481f0d0ddc8c3904801df832bec8dd47415980e4eeabbf3e4545561fd6e06d2a8fcedcf8f61b540d6441", 0x61}, {&(0x7f0000001580)="5472bd4109e10a121ee1ace6fcd379128d09ebaa1eb9edc73b7c57059825f7080da3ba417422bc54c24af9c014e9ddc7c376e23613968a977da5f89cc334ac8a2fd4240ee72e6f41b0bc7ca35a9dd870f093b562dd7f7d99415b0d82d54d9c5a651686b6d6ba454a331292fa521df235e583b982fd4dbbd6b8ab5a8ea69f10dab4cbf33b6685e579bfdde58796b640428a0b9c705c1a0cccbe1a519973a811885c9a83179a3f66705a805f37", 0xac}, {&(0x7f0000001640)="84773b306f3fbce28a2ed441ec879b24c11daa01557d972d8494265ca708da2457f4fd8b461d762873be046b62841f2299c7f26ebbc5c86f5405670c64f44fbf516ebaedbbc809f57aa3d2b517da9a4399a8a5dfcd05d60caa8d595d094c56b561c94010bbbc4005589934", 0x6b}], 0x5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000001780)={r8}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001bc0)={0x6, 0x1d, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3011cb06, 0x0, 0x0, 0x0, 0xcbb9}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x4}, @generic={0x1, 0x9, 0x3, 0x1, 0x4b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000001900)='GPL\x00', 0xffffffe0, 0x56, &(0x7f0000001940)=""/86, 0x41000, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001a00)={0x4, 0xd, 0x9, 0x4d60c0d}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001b00)=[r9, 0xffffffffffffffff, r0, r9, r8, r0], &(0x7f0000001b40)=[{0x0, 0x3, 0xe, 0xa}, {0x5, 0x4, 0xa, 0x2}, {0x1, 0x2, 0xa, 0xc}, {0x3, 0x5, 0xd, 0xb}, {0x5, 0x5, 0x2, 0x8}, {0x0, 0x3, 0x9, 0x1}, {0x1, 0x5, 0x6, 0x4}, {0x0, 0x3, 0x5, 0x2}]}, 0x90) syz_clone(0x1053000, &(0x7f0000002e00)="66ff2157a88f0718623c6812af265412b1befb3dde2aafffb3faf67cbdc812acef464a451c464471a255c0a92c74c23e7bf7ddc782dc2d0d27b5524c497df682ab86ee7458f2faf5456cca5e7a25524a15b2f90fcbd6cb43983bef4775e6f5c445b42a7bcc0c97ed7d84ba28c532eef955c846dd78fdfb9fb770227215ef6ead6ccc37829ea63e85d009bf4f252e0fc04f2e3ea7f81010a023d92e98c52601fe87a6114fe9c04fc8c11e7a5a7e9eb51cea11b065395f62c9", 0xb8, &(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40)="916134422db8db605fe6fbdb9bc16c46814f9069c675d55e1d2ab36b23fc7fff3c262a3814f929632234ca4b1e84586b") 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:06 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x0, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, 0xffffffffffffffff], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x0, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x0, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x0, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x0, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x0, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0x0, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0x0, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0x0, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 726.069476][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 726.081107][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 726.098973][T27687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:07 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 726.695588][T27431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:02:08 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, 0xffffffffffffffff], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 726.869808][ T3628] device hsr_slave_0 left promiscuous mode [ 726.911469][ T3628] device hsr_slave_1 left promiscuous mode [ 726.919815][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 726.955443][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 726.985619][ T3628] device bridge_slave_1 left promiscuous mode [ 727.008027][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0x9, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x0, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:08 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x0, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x0, 0x2, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x0, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) [ 727.500973][ T3628] device bridge_slave_0 left promiscuous mode [ 727.507227][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x0, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x0, 0x3, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, 0xffffffffffffffff], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x0, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x0, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x0, 0x6}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x455102, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x1) 22:02:09 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:10 executing program 2: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_lsm={0x1d, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d1}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @tail_call], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x6a, &(0x7f0000000200)=""/106, 0x41000, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x7, 0x401}, 0x10, r1, 0x0, 0xa, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x5, 0x2, 0x3}, {0x4, 0x5, 0xa, 0x5}, {0x2, 0x4, 0x6, 0x5}, {0x2, 0x5, 0x9, 0x8}, {0x0, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xa, 0xa}, {0x2, 0x5, 0xe, 0x4}, {0x0, 0x2, 0xe, 0x8}, {0x0, 0x1, 0xe, 0x7}]}, 0x90) 22:02:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140), 0x0, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@ifindex=r2, 0x3, 0x1, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440), 0x0}, 0x40) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x40, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x3, 0x1, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[0x1]}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000006c0)={0x5, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={@cgroup=r0, r4, 0xc, 0x14, r1, @link_id=r5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x10, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000a40)='./file0\x00', 0x0, 0x0, r4}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)={@ifindex=r6, r7, 0x14, 0x2000, r4, @prog_fd=r4, r3}, 0x20) r8 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}], 0x1, &(0x7f0000000bc0)=[{0x80, 0x4f, 0x5, "7f76318fa197ab9f58b7bfc78d68f17761cd9dbef70241a1d3976d2e08c2fa450e6a27e75f0d994fb387d047a64897acb33a41d8c48ed0adfa7cbfa451b2471b89c7917163df5d5ed4c2d5e9268dbe7855b060651d7d4add1fa9dd75bfef60b11c51da9632ca61e42ccd74b1c6"}, {0x68, 0x0, 0x0, "ea4387435850efa02149f1db1d69ee8e3ee5f471f376bdfefc88fb8b84686c5cd3cadf72d4371626bf7cd17703e68df53750eaa0a26df198d34201b2556a29a6b7576bed8bd8ae17ed29e0f90b817be83e9a123f53b8"}, {0x80, 0x10a, 0xd789, "b575bcc4c0000ed9eb3bcc8b82a104e18ba7913a2a9f0234badedd85458e5abbf6296de10fc7edb2dd1f8e95169e32793edfe7307cab2f789c94297575bb3348af48d78803d67d563f1282a80db64e3929a6d334e0d376bce0d1e4b0a9d386a1d8e1a36224b26fa8fcc2ceb259"}, {0xc0, 0x102, 0x5, "41a79c5fecdc6ab833b5a6175ae3ac38aa5cd879cc55eae8dc9822824ccbf89bcfbb65fa0e0a565ff6963aa9400eefb58f59986c7f2a6818bc9759e38ed1be7a7b828edb9e1a9285a81f9fad64337e734f30cfaca671634d259092f316245e0e10880e1d2892d0c0a4d0d52d3afc07a99d900ad6b73a2e7a3941e38e528e78322f49ee2386fbfc3536e28240cea041d481d0ee5ebd49bc88666bf3956a6c616e79db05633f37f6b8e44d90314c06e3e5"}, {0x88, 0x110, 0x0, "92cca0799d9c711c77ff1f6375d533adc42c26ac1dfdbce4553a54c065ee5af74011916e22e33c57027351417f26f98fa16aef8ca3e609ca608caa5b20611a466099f15ea676a7723a7d0cd331f81d8f6385c257af8f637ce874237aac17b2b0744b680c2ac7c272ee49dcabb248bd9f6e0ca9d989"}, {0x10}], 0x2c0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000010c0), &(0x7f0000001100)=r7}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001200)={r9, 0x58, &(0x7f0000001180)}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000001240), 0x4400, 0x0) ioctl$TUNSETTXFILTER(r10, 0x400454d1, &(0x7f0000001280)={0x1, 0x8, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x28}, @dev, @multicast, @local, @local, @random="90600fccfe98", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote]}) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000001300)={r8}) sendmsg$sock(r8, &(0x7f0000001740)={&(0x7f0000001340)=@vsock={0x28, 0x0, 0x2711}, 0x80, &(0x7f00000016c0)=[{&(0x7f00000013c0)="493a7ca9614628dbd25f7331c61faff10f7486af7596b426f6d89455ec7ad1c572a2760830b2963d08fce81434e81deb9dfe7b37234d871538ad486bba24046be4b8708d3bd6958e07fc2b9b2b02525b1fbab66af36937922498434fa748cca3d1b7ef86c49a4fc2737e6c11f65188f635b5badedc49bcde9d066aa221c6655393048106d0d0f2e6108c7b4ba1288a0e4ed8b76e53ed87edcc50523f500bf66c6e58ec8ce17dee61ad81e8b1db54fbf5d9613f008a4d739a8176f143cefbd35981f6fbfd69490a661d851f3ee51d21d513d9ad8b7cfdcf5de10523b00a77bba52979eebf63c99c45461c40d1a01ddcebd880c53bab", 0xf5}, {&(0x7f00000014c0)="c2bf20c8d37a3b61901c7455fbd98e93110cf61382fdf9d080739a7e3b1f", 0x1e}, {&(0x7f0000001500)="061fa6a670f782f5365e0fbfd1317c9dab40244fb3c1845952251c22533f6d64fcd68d47422d58accf6dc3f4fef8139435420243fd2581481f0d0ddc8c3904801df832bec8dd47415980e4eeabbf3e4545561fd6e06d2a8fcedcf8f61b540d6441", 0x61}, {&(0x7f0000001580)="5472bd4109e10a121ee1ace6fcd379128d09ebaa1eb9edc73b7c57059825f7080da3ba417422bc54c24af9c014e9ddc7c376e23613968a977da5f89cc334ac8a2fd4240ee72e6f41b0bc7ca35a9dd870f093b562dd7f7d99415b0d82d54d9c5a651686b6d6ba454a331292fa521df235e583b982fd4dbbd6b8ab5a8ea69f10dab4cbf33b6685e579bfdde58796b640428a0b9c705c1a0cccbe1a519973a811885c9a83179a3f66705a805f37", 0xac}, {&(0x7f0000001640)="84773b306f3fbce28a2ed441ec879b24c11daa01557d972d8494265ca708da2457f4fd8b461d762873be046b62841f2299c7f26ebbc5c86f5405670c64f44fbf516ebaedbbc809f57aa3d2b517da9a4399a8a5dfcd05d60caa8d595d094c56b561c94010bbbc4005589934", 0x6b}], 0x5}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000001780)={r8}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001bc0)={0x6, 0x25, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3011cb06, 0x0, 0x0, 0x0, 0xcbb9}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x4}, @generic={0x1, 0x9, 0x3, 0x1, 0x4b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @func]}, &(0x7f0000001900)='GPL\x00', 0xffffffe0, 0x56, &(0x7f0000001940)=""/86, 0x41000, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001a00)={0x4, 0xd, 0x9, 0x4d60c0d}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001b00)=[r9, 0xffffffffffffffff, r0, r9, r8, r0], &(0x7f0000001b40)=[{0x0, 0x3, 0xe, 0xa}, {0x5, 0x4, 0xa, 0x2}, {0x1, 0x2, 0xa, 0xc}, {0x3, 0x5, 0xd, 0xb}, {0x5, 0x5, 0x2, 0x8}, {0x0, 0x3, 0x9, 0x1}, {0x1, 0x5, 0x6, 0x4}, {0x0, 0x3, 0x5, 0x2}]}, 0x90) syz_clone(0x1053000, &(0x7f0000002e00)="66ff2157a88f0718623c6812af265412b1befb3dde2aafffb3faf67cbdc812acef464a451c464471a255c0a92c74c23e7bf7ddc782dc2d0d27b5524c497df682ab86ee7458f2faf5456cca5e7a25524a15b2f90fcbd6cb43983bef4775e6f5c445b42a7bcc0c97ed7d84ba28c532eef955c846dd78fdfb9fb770227215ef6ead6ccc37829ea63e85d009bf4f252e0fc04f2e3ea7f81010a023d92e98c52601fe87a6114fe9c04fc8c11e7a5a7e9eb51cea11b065395f62c9", 0xb8, &(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40)="916134422db8db605fe6fbdb9bc16c46814f9069c675d55e1d2ab36b23fc7fff3c262a3814f929632234ca4b1e84586b") 22:02:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x455102, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x1) 22:02:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x455102, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000000)=0x1) 22:02:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x455102, 0x0) [ 729.382383][ T3628] device hsr_slave_0 left promiscuous mode 22:02:11 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, 0xffffffffffffffff], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 729.797807][ T3628] device hsr_slave_1 left promiscuous mode 22:02:11 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x455102, 0x0) 22:02:11 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x455102, 0x0) [ 730.243328][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 22:02:12 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x455102, 0x0) [ 730.663574][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 22:02:12 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x455102, 0x0) [ 730.898322][ T3628] device bridge_slave_1 left promiscuous mode [ 730.921981][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:12 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 731.197761][ T3628] device bridge_slave_0 left promiscuous mode [ 731.210451][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, 0xffffffffffffffff, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 731.550464][ T3628] device hsr_slave_0 left promiscuous mode [ 731.660660][ T3628] device hsr_slave_1 left promiscuous mode [ 732.118293][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 22:02:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, 0xffffffffffffffff, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 732.183142][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 732.222843][ T3628] device bridge_slave_1 left promiscuous mode [ 732.229071][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 732.291985][ T3628] device bridge_slave_0 left promiscuous mode [ 732.298217][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.401614][ T3628] device bridge_slave_1 left promiscuous mode [ 733.407838][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.783113][ T3628] device bridge_slave_0 left promiscuous mode [ 733.796903][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:15 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, 0xffffffffffffffff, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:17 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r0}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[0xffffffffffffffff, r0, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 736.460515][ T3628] device hsr_slave_0 left promiscuous mode 22:02:18 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r0}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[0xffffffffffffffff, r0, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 737.707881][ T3628] device hsr_slave_1 left promiscuous mode [ 738.090547][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 22:02:19 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001300)={r3}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r0}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000001900)={r3, r4}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[0xffffffffffffffff, r0, r1], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x8, '\x00', 0x0, r6, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{}, &(0x7f0000000d00), &(0x7f0000000d40)=r5}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 738.440826][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 738.726561][T29237] cgroup: fork rejected by pids controller in /syz1 [ 738.823910][ T3628] device bridge_slave_1 left promiscuous mode [ 738.830146][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.721021][ T3628] device bridge_slave_0 left promiscuous mode [ 739.730195][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.481708][ T3628] device bridge_slave_1 left promiscuous mode [ 740.487930][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:22 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 741.098543][ T3628] device bridge_slave_0 left promiscuous mode [ 741.110587][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.572328][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 22:02:23 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 741.943518][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 742.412418][ T3628] device bridge_slave_1 left promiscuous mode [ 742.418684][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.516707][ T3569] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 742.525675][ T3569] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 742.529416][ T3628] device bridge_slave_0 left promiscuous mode [ 742.539730][ T3568] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 742.547670][ T3568] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 742.555778][ T3568] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 742.562965][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.570287][ T3568] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 742.991286][ T3628] device hsr_slave_0 left promiscuous mode 22:02:25 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 743.785830][ T3628] device hsr_slave_1 left promiscuous mode [ 744.149711][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 744.158853][ T3565] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 744.168523][ T3565] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 744.176788][ T3565] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 744.185162][ T3565] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 744.201668][ T3565] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 744.209109][ T3565] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 744.423171][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 744.620393][ T3565] Bluetooth: hci5: command 0x0409 tx timeout [ 744.664003][ T3628] device bridge_slave_1 left promiscuous mode [ 744.670269][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 745.380806][ T3628] device bridge_slave_0 left promiscuous mode [ 745.387040][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 746.220434][ T3565] Bluetooth: hci6: command 0x0409 tx timeout [ 746.700319][ T3565] Bluetooth: hci5: command 0x041b tx timeout [ 746.941682][ T1244] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.947988][ T1244] ieee802154 phy1 wpan1: encryption failed: -22 22:02:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 747.440430][ T3628] device hsr_slave_0 left promiscuous mode [ 747.785452][ T3628] device hsr_slave_1 left promiscuous mode 22:02:29 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 748.300434][ T3565] Bluetooth: hci6: command 0x041b tx timeout [ 748.510518][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 748.780333][ T3565] Bluetooth: hci5: command 0x040f tx timeout [ 748.866725][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 749.072603][ T3628] device bridge_slave_1 left promiscuous mode [ 749.078815][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:30 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 749.440977][ T3628] device bridge_slave_0 left promiscuous mode [ 749.447219][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:31 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 750.380380][ T3565] Bluetooth: hci6: command 0x040f tx timeout [ 750.870335][ T3565] Bluetooth: hci5: command 0x0419 tx timeout 22:02:32 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, 0x0, &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:33 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, 0x0, &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 751.560875][ T3628] device hsr_slave_0 left promiscuous mode [ 752.131075][ T3628] device hsr_slave_1 left promiscuous mode [ 752.460315][ T3565] Bluetooth: hci6: command 0x0419 tx timeout 22:02:34 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, 0x0, &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 752.900596][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 752.966177][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 753.062413][ T3628] device bridge_slave_1 left promiscuous mode [ 753.068798][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.128927][ T3628] device bridge_slave_0 left promiscuous mode [ 754.135256][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:35 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 755.101096][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_0 22:02:36 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 755.659894][ T3628] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 755.983267][ T3628] device bridge_slave_1 left promiscuous mode [ 755.989579][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state 22:02:38 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 756.991598][ T3628] device bridge_slave_0 left promiscuous mode [ 756.997843][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:39 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 757.984235][ T3628] device bridge_slave_1 left promiscuous mode [ 757.990866][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.120864][ T3628] device bridge_slave_0 left promiscuous mode [ 758.127115][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state 22:02:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:40 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 758.931615][ T3628] device veth1_vlan left promiscuous mode [ 758.938348][ T3628] device veth0_vlan left promiscuous mode 22:02:41 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 760.071076][ T3568] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 760.079570][ T3568] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 760.087721][ T3568] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 760.101104][ T3568] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 760.108963][ T3568] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 760.117097][ T3568] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 760.682474][T28963] syz-executor.1 (28963) used greatest stack depth: 17792 bytes left 22:02:42 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 22:02:42 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={0x0, &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 762.140340][ T3568] Bluetooth: hci7: command 0x0409 tx timeout 22:02:44 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={0x0, &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 762.730951][ T3565] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 762.739591][ T3565] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 762.747835][ T3565] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 762.755961][ T3565] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 762.763676][ T3565] Bluetooth: hci8: unexpected cc 0x0c25 length: 249 > 3 [ 762.771413][ T3565] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 22:02:44 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={0x0, &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 764.220375][ T3565] Bluetooth: hci7: command 0x041b tx timeout [ 764.860379][ T3565] Bluetooth: hci8: command 0x0409 tx timeout 22:02:46 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:47 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 766.300328][ T3565] Bluetooth: hci7: command 0x040f tx timeout [ 766.940414][ T3565] Bluetooth: hci8: command 0x041b tx timeout 22:02:48 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:49 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 768.380277][ T3565] Bluetooth: hci7: command 0x0419 tx timeout [ 769.020352][ T3565] Bluetooth: hci8: command 0x040f tx timeout 22:02:50 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:52 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 771.100341][ T3565] Bluetooth: hci8: command 0x0419 tx timeout 22:02:53 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:54 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:55 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:56 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa000003000000020000000000000000000000050000000000000400000000040000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:57 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa000003000000020000000000000000000000050000000000000400000000040000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:58 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa000003000000020000000000000000000000050000000000000400000000040000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:02:59 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:01 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 779.750309][ T3568] Bluetooth: hci4: command 0x0406 tx timeout 22:03:02 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:03 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 781.871168][ T3628] team0 (unregistering): Port device team_slave_1 removed 22:03:04 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 782.788461][ T3628] team0 (unregistering): Port device team_slave_0 removed 22:03:05 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 783.818253][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:03:05 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e781000000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 784.110926][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 22:03:06 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:07 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e781000000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:08 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:09 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 789.653271][ T3628] bond0 (unregistering): Released all slaves 22:03:11 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:14 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:15 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f00"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:16 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x148, 0x0, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:17 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x148, 0x0, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:18 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0, 0x148, 0x0, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:18 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:19 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:20 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 799.524229][ T3628] team0 (unregistering): Port device team_slave_1 removed [ 799.600438][ T3628] team0 (unregistering): Port device team_slave_0 removed [ 799.794118][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 800.220330][ T3565] Bluetooth: hci0: command 0x0406 tx timeout 22:03:22 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 801.190796][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 22:03:23 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:24 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:25 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:25 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 804.803979][ T3628] bond0 (unregistering): Released all slaves [ 805.350285][ T3568] Bluetooth: hci1: command 0x0406 tx timeout 22:03:27 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={0x0, 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:27 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:29 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 808.381752][ T1244] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.388059][ T1244] ieee802154 phy1 wpan1: encryption failed: -22 22:03:30 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00'}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 808.699416][ T3565] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 808.707825][ T3565] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 808.715630][ T3565] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 808.723724][ T3565] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 808.731445][ T3565] Bluetooth: hci9: unexpected cc 0x0c25 length: 249 > 3 [ 808.739191][ T3565] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 22:03:31 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 810.320758][ T3568] Bluetooth: hci10: unexpected cc 0x0c03 length: 249 > 1 [ 810.329185][ T3568] Bluetooth: hci10: unexpected cc 0x1003 length: 249 > 9 [ 810.337103][ T3568] Bluetooth: hci10: unexpected cc 0x1001 length: 249 > 9 [ 810.345428][ T3568] Bluetooth: hci10: unexpected cc 0x0c23 length: 249 > 4 [ 810.353318][ T3568] Bluetooth: hci10: unexpected cc 0x0c25 length: 249 > 3 [ 810.361936][ T3568] Bluetooth: hci10: unexpected cc 0x0c38 length: 249 > 2 [ 810.780311][ T3568] Bluetooth: hci9: command 0x0409 tx timeout 22:03:32 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 811.204093][ T3628] team0 (unregistering): Port device team_slave_1 removed 22:03:33 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 812.380360][ T3568] Bluetooth: hci10: command 0x0409 tx timeout [ 812.671720][ T3628] team0 (unregistering): Port device team_slave_0 removed [ 812.860320][ T3568] Bluetooth: hci9: command 0x041b tx timeout 22:03:34 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 813.540720][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:03:35 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 814.460431][ T3568] Bluetooth: hci10: command 0x041b tx timeout 22:03:36 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 814.938469][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 814.947240][ T3568] Bluetooth: hci9: command 0x040f tx timeout [ 816.540409][ T3568] Bluetooth: hci10: command 0x040f tx timeout 22:03:38 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 817.020260][ T3568] Bluetooth: hci9: command 0x0419 tx timeout 22:03:39 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 818.620826][ T3568] Bluetooth: hci10: command 0x0419 tx timeout 22:03:40 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:41 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 821.420979][ T3628] bond0 (unregistering): Released all slaves 22:03:43 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:44 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:45 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:46 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:47 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 826.191731][ T3565] Bluetooth: hci11: unexpected cc 0x0c03 length: 249 > 1 [ 826.200100][ T3565] Bluetooth: hci11: unexpected cc 0x1003 length: 249 > 9 [ 826.208377][ T3565] Bluetooth: hci11: unexpected cc 0x1001 length: 249 > 9 [ 826.220876][ T3565] Bluetooth: hci11: unexpected cc 0x0c23 length: 249 > 4 [ 826.228747][ T3565] Bluetooth: hci11: unexpected cc 0x0c25 length: 249 > 3 [ 826.236770][ T3565] Bluetooth: hci11: unexpected cc 0x0c38 length: 249 > 2 22:03:49 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 827.830948][ T3628] bond0 (unregistering): Released all slaves [ 828.300374][ T3568] Bluetooth: hci11: command 0x0409 tx timeout 22:03:50 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 828.860995][ T3565] Bluetooth: hci12: unexpected cc 0x0c03 length: 249 > 1 [ 828.869910][ T3565] Bluetooth: hci12: unexpected cc 0x1003 length: 249 > 9 [ 828.877767][ T3565] Bluetooth: hci12: unexpected cc 0x1001 length: 249 > 9 [ 828.885992][ T3565] Bluetooth: hci12: unexpected cc 0x0c23 length: 249 > 4 [ 828.894723][ T3565] Bluetooth: hci12: unexpected cc 0x0c25 length: 249 > 3 [ 828.902254][ T3565] Bluetooth: hci12: unexpected cc 0x0c38 length: 249 > 2 22:03:51 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 830.380392][ T3565] Bluetooth: hci11: command 0x041b tx timeout 22:03:52 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 830.940520][ T3565] Bluetooth: hci12: command 0x0409 tx timeout 22:03:53 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:03:54 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 832.460324][ T3565] Bluetooth: hci11: command 0x040f tx timeout [ 833.020439][ T3565] Bluetooth: hci12: command 0x041b tx timeout 22:03:55 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 834.540409][ T3565] Bluetooth: hci11: command 0x0419 tx timeout 22:03:56 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 835.100488][ T3565] Bluetooth: hci12: command 0x040f tx timeout 22:03:57 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 837.032671][ T3628] team0 (unregistering): Port device team_slave_1 removed [ 837.180469][ T3565] Bluetooth: hci12: command 0x0419 tx timeout 22:03:58 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 838.184364][ T3628] team0 (unregistering): Port device team_slave_0 removed 22:04:00 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 839.121002][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:04:01 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:02 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 840.760711][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 22:04:03 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:04 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:05 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:05 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:06 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, 0x0, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 845.973119][ T3628] bond0 (unregistering): Released all slaves 22:04:08 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:09 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 847.644207][ T3628] team0 (unregistering): Port device team_slave_1 removed [ 848.540964][ T3628] team0 (unregistering): Port device team_slave_0 removed 22:04:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 849.700892][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:04:11 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 851.050775][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 22:04:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:15 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {0x0}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:17 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {0x0}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:17 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {0x0}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 856.350846][ T3628] bond0 (unregistering): Released all slaves 22:04:19 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:20 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 859.651919][ T3628] team0 (unregistering): Port device team_slave_1 removed 22:04:21 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 860.239036][ T3628] team0 (unregistering): Port device team_slave_0 removed 22:04:22 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)='&', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 861.190778][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:04:23 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)='&', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 862.358610][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 22:04:24 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b40)='&', 0x1}], 0x1, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:25 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:26 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:27 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:28 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 866.752749][ T3628] bond0 (unregistering): Released all slaves [ 866.780407][ T3568] Bluetooth: hci5: command 0x0406 tx timeout [ 866.786497][ T3568] Bluetooth: hci6: command 0x0406 tx timeout 22:04:29 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:30 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:31 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 869.821738][ T1244] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.828043][ T1244] ieee802154 phy1 wpan1: encryption failed: -22 22:04:32 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 871.225187][ T3628] team0 (unregistering): Port device team_slave_1 removed 22:04:33 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:33 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 872.008813][ T3628] team0 (unregistering): Port device team_slave_0 removed [ 872.810707][ T3628] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 22:04:34 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="9f18000000000000002601000026010000080000000200000009000084030000000400000004400000f9ffffff07000000040000000900000007000000000000006c0000000900000005000000060000000d00000003000000ff0100000800000005000000010000000900000005000000000400000e00000001000000248100000300000005000000000200000800000000000009050000000d0057000000000e0400000001000000050000000600000f0200000002000000c7feffffd0000000030000000000000006000000050000009ffa0000030000000200000000000000000000000500000000000004000000000400000001000000018000003faf0300000004000084010001000100000005000000400000000e000000040000000100000009000000040000000002000007000000020000e7810000000000005f2e00005f0000"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") 22:04:35 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 874.420756][ T3628] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 874.750670][ T3565] Bluetooth: hci13: unexpected cc 0x0c03 length: 249 > 1 [ 874.759213][ T3565] Bluetooth: hci13: unexpected cc 0x1003 length: 249 > 9 [ 874.767077][ T3565] Bluetooth: hci13: unexpected cc 0x1001 length: 249 > 9 [ 874.775651][ T3565] Bluetooth: hci13: unexpected cc 0x0c23 length: 249 > 4 [ 874.783350][ T3565] Bluetooth: hci13: unexpected cc 0x0c25 length: 249 > 3 [ 874.790944][ T3565] Bluetooth: hci13: unexpected cc 0x0c38 length: 249 > 2 22:04:36 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 875.580294][ T28] INFO: task kworker/0:0:7 blocked for more than 143 seconds. [ 875.587955][ T28] Not tainted 6.1.75-syzkaller #0 [ 875.610180][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 875.619109][ T28] task:kworker/0:0 state:D stack:24672 pid:7 ppid:2 flags:0x00004000 [ 875.651334][ T28] Workqueue: ipv6_addrconf addrconf_verify_work [ 875.657630][ T28] Call Trace: [ 875.681392][ T28] [ 875.684367][ T28] __schedule+0x142d/0x4550 [ 875.688898][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 875.711386][ T28] ? release_firmware_map_entry+0x185/0x185 [ 875.717601][ T28] ? print_irqtrace_events+0x210/0x210 [ 875.730183][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 875.735412][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 875.760231][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 875.765464][ T28] schedule+0xbf/0x180 [ 875.769551][ T28] schedule_preempt_disabled+0xf/0x20 [ 875.790257][ T28] __mutex_lock+0x6b9/0xd80 [ 875.794938][ T28] ? __mutex_lock+0x53c/0xd80 [ 875.799632][ T28] ? addrconf_verify_work+0x15/0x30 [ 875.820254][ T28] ? mutex_lock_nested+0x10/0x10 [ 875.825275][ T28] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 875.840200][ T28] ? print_irqtrace_events+0x210/0x210 [ 875.845691][ T28] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 875.870203][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 875.875438][ T28] ? process_one_work+0x7a9/0x11d0 [ 875.890272][ T28] addrconf_verify_work+0x15/0x30 [ 875.895326][ T28] process_one_work+0x8a9/0x11d0 [ 875.911327][ T28] ? worker_detach_from_pool+0x260/0x260 [ 875.916997][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 875.932417][ T28] ? kthread_data+0x4e/0xc0 [ 875.936955][ T28] ? wq_worker_running+0x97/0x190 [ 875.960262][ T28] worker_thread+0xa47/0x1200 [ 875.964975][ T28] ? release_firmware_map_entry+0x185/0x185 [ 875.980339][ T28] kthread+0x28d/0x320 [ 875.984440][ T28] ? worker_clr_flags+0x190/0x190 [ 875.989486][ T28] ? kthread_blkcg+0xd0/0xd0 [ 876.030189][ T28] ret_from_fork+0x1f/0x30 [ 876.034651][ T28] [ 876.037742][ T28] INFO: task dhcpcd:3217 blocked for more than 143 seconds. [ 876.070460][ T28] Not tainted 6.1.75-syzkaller #0 [ 876.076026][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 876.092872][ T28] task:dhcpcd state:D stack:21448 pid:3217 ppid:3216 flags:0x00004002 [ 876.123532][ T28] Call Trace: [ 876.128365][ T28] [ 876.133877][ T28] __schedule+0x142d/0x4550 [ 876.138463][ T28] ? __mutex_lock+0x6b4/0xd80 [ 876.163513][ T28] ? release_firmware_map_entry+0x185/0x185 [ 876.169458][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 876.191315][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 876.196548][ T28] schedule+0xbf/0x180 [ 876.213000][ T28] schedule_preempt_disabled+0xf/0x20 [ 876.218409][ T28] __mutex_lock+0x6b9/0xd80 [ 876.243621][ T28] ? __mutex_lock+0x53c/0xd80 [ 876.248326][ T28] ? devinet_ioctl+0x2a5/0x1b20 [ 876.280183][ T28] ? mutex_lock_nested+0x10/0x10 [ 876.285182][ T28] ? bpf_lsm_capable+0x5/0x10 [ 876.289882][ T28] ? security_capable+0x86/0xb0 [ 876.299628][ T28] devinet_ioctl+0x2a5/0x1b20 [ 876.307912][ T28] ? get_user_ifreq+0x1b2/0x1f0 [ 876.331326][ T28] inet_ioctl+0x32d/0x400 [ 876.335685][ T28] ? inet_shutdown+0x370/0x370 [ 876.345925][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 876.371366][ T28] ? tomoyo_path_number_perm+0x1f2/0x7f0 [ 876.377038][ T28] sock_do_ioctl+0x152/0x450 [ 876.387735][ T28] ? sock_show_fdinfo+0xb0/0xb0 [ 876.400243][ T28] ? __lock_acquire+0x1f80/0x1f80 [ 876.405364][ T28] sock_ioctl+0x47f/0x770 [ 876.409712][ T28] ? sock_poll+0x410/0x410 [ 876.430331][ T28] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 876.436709][ T28] ? print_irqtrace_events+0x210/0x210 [ 876.461370][ T28] ? print_irqtrace_events+0x210/0x210 [ 876.466871][ T28] ? bpf_lsm_file_ioctl+0x5/0x10 [ 876.500189][ T28] ? security_file_ioctl+0x7d/0xa0 [ 876.505343][ T28] ? sock_poll+0x410/0x410 [ 876.509776][ T28] __se_sys_ioctl+0xf1/0x160 [ 876.520742][ T3568] Bluetooth: hci14: unexpected cc 0x0c03 length: 249 > 1 [ 876.529578][ T3568] Bluetooth: hci14: unexpected cc 0x1003 length: 249 > 9 [ 876.537716][ T3568] Bluetooth: hci14: unexpected cc 0x1001 length: 249 > 9 [ 876.545694][ T3568] Bluetooth: hci14: unexpected cc 0x0c23 length: 249 > 4 [ 876.553870][ T3568] Bluetooth: hci14: unexpected cc 0x0c25 length: 249 > 3 [ 876.561096][ T28] do_syscall_64+0x3d/0xb0 [ 876.565690][ T3568] Bluetooth: hci14: unexpected cc 0x0c38 length: 249 > 2 [ 876.572327][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 876.579197][ T28] RIP: 0033:0x7f72ac11bd49 [ 876.611366][ T28] RSP: 002b:00007ffc4f0702e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 876.619827][ T28] RAX: ffffffffffffffda RBX: 00007f72ac04d6c0 RCX: 00007f72ac11bd49 [ 876.658159][ T28] RDX: 00007ffc4f0804d8 RSI: 0000000000008914 RDI: 0000000000000010 [ 876.688040][ T28] RBP: 00007ffc4f090698 R08: 00007ffc4f080498 R09: 00007ffc4f080448 [ 876.724833][ T28] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 876.740257][ T28] R13: 00007ffc4f0804d8 R14: 0000000000000028 R15: 0000000000008914 [ 876.761368][ T28] [ 876.764438][ T28] INFO: task kworker/0:7:3604 blocked for more than 144 seconds. 22:04:38 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 876.784767][ T28] Not tainted 6.1.75-syzkaller #0 [ 876.802606][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 876.836225][ T28] task:kworker/0:7 state:D stack:23192 pid:3604 ppid:2 flags:0x00004000 [ 876.860324][ T28] Workqueue: events switchdev_deferred_process_work [ 876.860414][ T3568] Bluetooth: hci13: command 0x0409 tx timeout [ 876.866940][ T28] Call Trace: [ 876.866948][ T28] [ 876.866959][ T28] __schedule+0x142d/0x4550 [ 876.908062][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 876.920960][ T28] ? release_firmware_map_entry+0x185/0x185 [ 876.926887][ T28] ? print_irqtrace_events+0x210/0x210 [ 876.940275][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 876.950544][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 876.955774][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 876.979904][ T28] schedule+0xbf/0x180 [ 876.984405][ T28] schedule_preempt_disabled+0xf/0x20 [ 876.989801][ T28] __mutex_lock+0x6b9/0xd80 [ 877.000252][ T28] ? __mutex_lock+0x53c/0xd80 [ 877.004955][ T28] ? switchdev_deferred_process_work+0xa/0x20 [ 877.028797][ T28] ? mutex_lock_nested+0x10/0x10 [ 877.035178][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.050227][ T28] ? process_one_work+0x7a9/0x11d0 [ 877.055370][ T28] switchdev_deferred_process_work+0xa/0x20 [ 877.070195][ T28] process_one_work+0x8a9/0x11d0 [ 877.075168][ T28] ? worker_detach_from_pool+0x260/0x260 [ 877.100532][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 877.106102][ T28] ? kthread_data+0x4e/0xc0 [ 877.130327][ T28] ? wq_worker_running+0x97/0x190 [ 877.135393][ T28] worker_thread+0xa47/0x1200 [ 877.140079][ T28] ? _raw_spin_unlock+0x40/0x40 [ 877.160280][ T28] ? release_firmware_map_entry+0x185/0x185 [ 877.166208][ T28] ? _raw_spin_unlock+0x40/0x40 [ 877.180364][ T28] kthread+0x28d/0x320 [ 877.184463][ T28] ? worker_clr_flags+0x190/0x190 [ 877.189498][ T28] ? kthread_blkcg+0xd0/0xd0 [ 877.211078][ T28] ret_from_fork+0x1f/0x30 [ 877.215694][ T28] [ 877.218723][ T28] INFO: task kworker/0:8:3605 blocked for more than 144 seconds. [ 877.227022][ T28] Not tainted 6.1.75-syzkaller #0 [ 877.232987][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 877.249311][ T28] task:kworker/0:8 state:D stack:24344 pid:3605 ppid:2 flags:0x00004000 [ 877.270202][ T28] Workqueue: events linkwatch_event [ 877.275434][ T28] Call Trace: [ 877.278717][ T28] [ 877.282087][ T28] __schedule+0x142d/0x4550 [ 877.286639][ T28] ? release_firmware_map_entry+0x185/0x185 [ 877.300243][ T28] ? print_irqtrace_events+0x210/0x210 [ 877.305731][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.320334][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 877.325566][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 877.340432][ T28] schedule+0xbf/0x180 [ 877.344528][ T28] schedule_preempt_disabled+0xf/0x20 [ 877.350031][ T28] __mutex_lock+0x6b9/0xd80 [ 877.355902][ T28] ? __mutex_lock+0x53c/0xd80 [ 877.380237][ T28] ? linkwatch_event+0xa/0x50 [ 877.384957][ T28] ? mutex_lock_nested+0x10/0x10 [ 877.389905][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.430341][ T28] ? process_one_work+0x7a9/0x11d0 [ 877.435491][ T28] linkwatch_event+0xa/0x50 [ 877.440002][ T28] process_one_work+0x8a9/0x11d0 [ 877.450420][ T28] ? worker_detach_from_pool+0x260/0x260 [ 877.460465][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 877.466041][ T28] ? kthread_data+0x4e/0xc0 [ 877.482193][ T28] ? wq_worker_running+0x97/0x190 [ 877.487255][ T28] worker_thread+0xa47/0x1200 [ 877.492318][ T28] ? release_firmware_map_entry+0x185/0x185 [ 877.498253][ T28] kthread+0x28d/0x320 [ 877.510383][ T28] ? worker_clr_flags+0x190/0x190 [ 877.515433][ T28] ? kthread_blkcg+0xd0/0xd0 [ 877.520037][ T28] ret_from_fork+0x1f/0x30 [ 877.530672][ T28] [ 877.533737][ T28] INFO: task kworker/1:7:25849 blocked for more than 145 seconds. [ 877.550258][ T28] Not tainted 6.1.75-syzkaller #0 [ 877.555908][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 877.565502][ T28] task:kworker/1:7 state:D stack:24416 pid:25849 ppid:2 flags:0x00004000 [ 877.590945][ T28] Workqueue: ipv6_addrconf addrconf_dad_work [ 877.596962][ T28] Call Trace: [ 877.600585][ T28] [ 877.603545][ T28] __schedule+0x142d/0x4550 [ 877.608066][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.630266][ T28] ? release_firmware_map_entry+0x185/0x185 [ 877.636206][ T28] ? print_irqtrace_events+0x210/0x210 [ 877.642087][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.647318][ T28] ? _raw_spin_unlock_irq+0x1f/0x40 [ 877.670248][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 877.675513][ T28] schedule+0xbf/0x180 [ 877.679602][ T28] schedule_preempt_disabled+0xf/0x20 [ 877.685801][ T28] __mutex_lock+0x6b9/0xd80 [ 877.700908][ T28] ? __mutex_lock+0x53c/0xd80 [ 877.705624][ T28] ? addrconf_dad_work+0xcc/0x16b0 [ 877.720206][ T28] ? mutex_lock_nested+0x10/0x10 [ 877.725189][ T28] addrconf_dad_work+0xcc/0x16b0 [ 877.730140][ T28] ? read_lock_is_recursive+0x10/0x10 [ 877.745769][ T28] ? ipv6_get_saddr_eval+0xe90/0xe90 [ 877.751382][ T28] ? print_irqtrace_events+0x210/0x210 [ 877.756869][ T28] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 877.789103][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 877.810965][ T28] ? process_one_work+0x7a9/0x11d0 [ 877.816110][ T28] process_one_work+0x8a9/0x11d0 [ 877.840419][ T28] ? worker_detach_from_pool+0x260/0x260 [ 877.846095][ T28] ? _raw_spin_lock_irqsave+0x120/0x120 [ 877.860240][ T28] ? kthread_data+0x4e/0xc0 [ 877.865202][ T28] ? wq_worker_running+0x97/0x190 [ 877.890190][ T28] worker_thread+0xa47/0x1200 [ 877.894912][ T28] ? release_firmware_map_entry+0x185/0x185 [ 877.910200][ T28] kthread+0x28d/0x320 [ 877.914308][ T28] ? worker_clr_flags+0x190/0x190 [ 877.919349][ T28] ? kthread_blkcg+0xd0/0xd0 [ 877.947294][ T28] ret_from_fork+0x1f/0x30 [ 877.952211][ T28] [ 877.955265][ T28] INFO: task syz-executor.4:27431 blocked for more than 145 seconds. [ 877.970186][ T28] Not tainted 6.1.75-syzkaller #0 [ 877.975752][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 877.990188][ T28] task:syz-executor.4 state:D stack:21192 pid:27431 ppid:1 flags:0x00004006 [ 877.999432][ T28] Call Trace: [ 878.003136][ T28] [ 878.006084][ T28] __schedule+0x142d/0x4550 [ 878.020255][ T28] ? __mutex_lock+0x6b4/0xd80 [ 878.025014][ T28] ? release_firmware_map_entry+0x185/0x185 [ 878.031952][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 878.037447][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 878.050212][ T28] schedule+0xbf/0x180 [ 878.054317][ T28] schedule_preempt_disabled+0xf/0x20 [ 878.059700][ T28] __mutex_lock+0x6b9/0xd80 [ 878.080517][ T28] ? __mutex_lock+0x53c/0xd80 [ 878.085225][ T28] ? rtnetlink_rcv_msg+0x7c1/0xff0 [ 878.100204][ T28] ? mutex_lock_nested+0x10/0x10 [ 878.105182][ T28] ? rtnetlink_rcv_msg+0x1f9/0xff0 [ 878.120203][ T28] rtnetlink_rcv_msg+0x7c1/0xff0 [ 878.125172][ T28] ? rtnetlink_bind+0x80/0x80 [ 878.129858][ T28] ? stack_trace_save+0x1c0/0x1c0 [ 878.141228][ T28] ? kernel_text_address+0x9f/0xd0 [ 878.150495][ T28] ? __kernel_text_address+0x9/0x40 [ 878.155716][ T28] ? unwind_get_return_address+0x49/0x80 [ 878.172503][ T28] ? arch_stack_walk+0xf3/0x140 [ 878.177384][ T28] ? mark_lock+0x9a/0x340 [ 878.190253][ T28] ? mark_lock+0x9a/0x340 [ 878.194640][ T28] ? __lock_acquire+0x125b/0x1f80 [ 878.199705][ T28] netlink_rcv_skb+0x1cd/0x410 [ 878.218723][ T28] ? rtnetlink_bind+0x80/0x80 [ 878.230248][ T28] ? netlink_ack+0x1290/0x1290 [ 878.235086][ T28] ? netlink_deliver_tap+0x2e/0x1b0 [ 878.250890][ T28] netlink_unicast+0x7d8/0x970 [ 878.255693][ T28] ? netlink_detachskb+0x90/0x90 [ 878.270375][ T28] ? __virt_addr_valid+0x22b/0x2e0 [ 878.276494][ T28] ? __phys_addr_symbol+0x2b/0x70 [ 878.290236][ T28] ? __check_object_size+0x4dd/0xa30 [ 878.295552][ T28] ? bpf_lsm_netlink_send+0x5/0x10 [ 878.310250][ T28] netlink_sendmsg+0xa26/0xd60 [ 878.315059][ T28] ? netlink_getsockopt+0x580/0x580 [ 878.330238][ T28] ? __might_fault+0xa1/0x110 [ 878.334947][ T28] ? aa_sock_msg_perm+0x91/0x150 [ 878.339899][ T28] ? bpf_lsm_socket_sendmsg+0x5/0x10 22:04:40 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 878.360841][ T28] ? security_socket_sendmsg+0x7d/0xa0 [ 878.366429][ T28] ? netlink_getsockopt+0x580/0x580 [ 878.390796][ T28] __sys_sendto+0x480/0x600 [ 878.395547][ T28] ? __ia32_sys_getpeername+0x80/0x80 [ 878.410565][ T28] ? print_irqtrace_events+0x210/0x210 [ 878.416169][ T28] __x64_sys_sendto+0xda/0xf0 [ 878.430383][ T28] do_syscall_64+0x3d/0xb0 [ 878.434931][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 878.450233][ T28] RIP: 0033:0x7fdd8147ea9c [ 878.454678][ T28] RSP: 002b:00007ffe5e961540 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 878.480236][ T28] RAX: ffffffffffffffda RBX: 00007fdd820d4620 RCX: 00007fdd8147ea9c [ 878.488241][ T28] RDX: 0000000000000028 RSI: 00007fdd820d4670 RDI: 0000000000000003 [ 878.510237][ T28] RBP: 0000000000000000 R08: 00007ffe5e961594 R09: 000000000000000c [ 878.518244][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 878.547976][ T28] R13: 0000000000000000 R14: 00007fdd820d4670 R15: 0000000000000000 [ 878.560230][ T28] [ 878.570876][ T28] INFO: task syz-executor.3:27504 blocked for more than 146 seconds. [ 878.578962][ T28] Not tainted 6.1.75-syzkaller #0 [ 878.600256][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 878.608954][ T28] task:syz-executor.3 state:D stack:21736 pid:27504 ppid:1 flags:0x00004006 [ 878.620596][ T3565] Bluetooth: hci14: command 0x0409 tx timeout [ 878.640261][ T28] Call Trace: [ 878.643570][ T28] [ 878.646513][ T28] __schedule+0x142d/0x4550 [ 878.660273][ T28] ? __mutex_lock+0x6b4/0xd80 [ 878.664980][ T28] ? release_firmware_map_entry+0x185/0x185 [ 878.680315][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 878.686264][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 878.692430][ T28] schedule+0xbf/0x180 [ 878.696524][ T28] schedule_preempt_disabled+0xf/0x20 [ 878.702295][ T28] __mutex_lock+0x6b9/0xd80 [ 878.706820][ T28] ? __mutex_lock+0x53c/0xd80 [ 878.711788][ T28] ? nsim_destroy+0x3a/0x140 [ 878.716391][ T28] ? mutex_lock_nested+0x10/0x10 [ 878.721718][ T28] ? delayed_work_timer_fn+0x80/0x80 [ 878.727033][ T28] nsim_destroy+0x3a/0x140 [ 878.731768][ T28] __nsim_dev_port_del+0x153/0x1b0 [ 878.736898][ T28] nsim_dev_reload_destroy+0x286/0x490 [ 878.742694][ T28] ? nsim_bus_probe+0x20/0x20 [ 878.747387][ T28] nsim_drv_remove+0x5c/0x160 [ 878.752376][ T28] device_release_driver_internal+0x4f3/0x880 [ 878.758470][ T28] bus_remove_device+0x2e5/0x400 [ 878.770308][ T28] device_del+0x6e2/0xbd0 [ 878.774681][ T28] ? kill_device+0x160/0x160 [ 878.779289][ T28] device_unregister+0x1c/0xc0 [ 878.790271][ T28] del_device_store+0x35f/0x480 [ 878.795178][ T28] ? del_port_store+0x1d0/0x1d0 [ 878.800049][ T28] ? sysfs_kf_write+0x181/0x2a0 [ 878.810195][ T28] ? sysfs_kf_read+0x300/0x300 [ 878.815014][ T28] kernfs_fop_write_iter+0x3a2/0x4f0 [ 878.830237][ T28] vfs_write+0x7ae/0xba0 [ 878.834587][ T28] ? file_end_write+0x250/0x250 [ 878.839454][ T28] ? do_sys_openat2+0x42b/0x500 [ 878.850267][ T28] ? __fdget_pos+0x2c1/0x360 [ 878.854886][ T28] ksys_write+0x19c/0x2c0 [ 878.859225][ T28] ? print_irqtrace_events+0x210/0x210 [ 878.880268][ T28] ? __ia32_sys_read+0x80/0x80 [ 878.885063][ T28] ? syscall_enter_from_user_mode+0x2e/0x220 [ 878.900250][ T28] ? lockdep_hardirqs_on+0x94/0x130 [ 878.905474][ T28] ? syscall_enter_from_user_mode+0x2e/0x220 [ 878.930217][ T28] do_syscall_64+0x3d/0xb0 [ 878.934670][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 878.941000][ T28] RIP: 0033:0x7f4e7747baef [ 878.945427][ T28] RSP: 002b:00007ffebb570490 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 878.953910][ T3565] Bluetooth: hci13: command 0x041b tx timeout [ 878.980245][ T28] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007f4e7747baef [ 878.988249][ T28] RDX: 0000000000000001 RSI: 00007ffebb5704e0 RDI: 0000000000000005 [ 878.997027][ T28] RBP: 00007f4e774c9021 R08: 0000000000000000 R09: 00007ffebb5702e7 [ 879.005307][ T28] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 879.013527][ T28] R13: 00007ffebb5704e0 R14: 00007f4e780d4620 R15: 0000000000000003 [ 879.022445][ T28] [ 879.025488][ T28] INFO: task syz-executor.2:29197 blocked for more than 146 seconds. [ 879.035086][ T28] Not tainted 6.1.75-syzkaller #0 [ 879.040917][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 879.049598][ T28] task:syz-executor.2 state:D stack:26824 pid:29197 ppid:3572 flags:0x00004006 [ 879.059139][ T28] Call Trace: [ 879.063367][ T28] [ 879.066318][ T28] __schedule+0x142d/0x4550 [ 879.071149][ T28] ? __mutex_lock+0x6b4/0xd80 [ 879.075859][ T28] ? release_firmware_map_entry+0x185/0x185 [ 879.082109][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 879.087605][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 879.100450][ T28] schedule+0xbf/0x180 [ 879.104550][ T28] schedule_preempt_disabled+0xf/0x20 [ 879.109933][ T28] __mutex_lock+0x6b9/0xd80 [ 879.120325][ T28] ? __mutex_lock+0x53c/0xd80 [ 879.125032][ T28] ? tun_chr_close+0x3a/0x1b0 [ 879.129722][ T28] ? mutex_lock_nested+0x10/0x10 [ 879.140251][ T28] ? task_work_run+0x1fc/0x300 [ 879.145054][ T28] tun_chr_close+0x3a/0x1b0 [ 879.149572][ T28] ? tun_chr_open+0x4d0/0x4d0 [ 879.166276][ T28] __fput+0x3b7/0x890 [ 879.172279][ T28] task_work_run+0x246/0x300 [ 879.176909][ T28] ? task_work_cancel+0x2b0/0x2b0 [ 879.190253][ T28] ? __x64_sys_openat+0x243/0x290 [ 879.195373][ T28] ? exit_to_user_mode_loop+0x39/0x100 [ 879.210845][ T28] exit_to_user_mode_loop+0xde/0x100 [ 879.216181][ T28] exit_to_user_mode_prepare+0xb1/0x140 [ 879.230266][ T28] syscall_exit_to_user_mode+0x60/0x270 [ 879.235866][ T28] do_syscall_64+0x49/0xb0 [ 879.250197][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 879.256121][ T28] RIP: 0033:0x7fda67e7cda9 [ 879.270236][ T28] RSP: 002b:00007fda68bba0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 879.278677][ T28] RAX: ffffffffffffffea RBX: 00007fda67fabf80 RCX: 00007fda67e7cda9 [ 879.316988][ T28] RDX: 0000000000004400 RSI: 0000000020001240 RDI: ffffffffffffff9c [ 879.342602][ T28] RBP: 00007fda67ec947a R08: 0000000000000000 R09: 0000000000000000 [ 879.373538][ T28] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 879.386750][ T28] R13: 000000000000000b R14: 00007fda67fabf80 R15: 00007ffca35341b8 [ 879.410331][ T28] [ 879.413384][ T28] INFO: task syz-executor.0:29220 blocked for more than 147 seconds. [ 879.431441][ T28] Not tainted 6.1.75-syzkaller #0 [ 879.437020][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 879.461966][ T28] task:syz-executor.0 state:D stack:25000 pid:29220 ppid:3564 flags:0x00004006 22:04:41 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 879.480192][ T28] Call Trace: [ 879.483510][ T28] [ 879.486452][ T28] __schedule+0x142d/0x4550 [ 879.510352][ T28] ? __mutex_lock+0x6b4/0xd80 [ 879.515077][ T28] ? release_firmware_map_entry+0x185/0x185 [ 879.532289][ T28] ? __mutex_trylock_common+0x8d/0x2e0 [ 879.537802][ T28] ? do_raw_spin_unlock+0x137/0x8a0 [ 879.588463][ T28] schedule+0xbf/0x180 [ 879.600187][ T28] schedule_preempt_disabled+0xf/0x20 [ 879.606701][ T28] __mutex_lock+0x6b9/0xd80 [ 879.620187][ T28] ? __mutex_lock+0x53c/0xd80 [ 879.624904][ T28] ? tun_chr_close+0x3a/0x1b0 [ 879.629610][ T28] ? mutex_lock_nested+0x10/0x10 [ 879.650320][ T28] ? task_work_run+0x1fc/0x300 [ 879.655132][ T28] tun_chr_close+0x3a/0x1b0 [ 879.659652][ T28] ? tun_chr_open+0x4d0/0x4d0 [ 879.680222][ T28] __fput+0x3b7/0x890 [ 879.684257][ T28] task_work_run+0x246/0x300 [ 879.688866][ T28] ? task_work_cancel+0x2b0/0x2b0 [ 879.708661][ T28] ? exit_to_user_mode_loop+0x39/0x100 [ 879.720270][ T28] exit_to_user_mode_loop+0xde/0x100 [ 879.730515][ T28] exit_to_user_mode_prepare+0xb1/0x140 [ 879.740517][ T28] syscall_exit_to_user_mode+0x60/0x270 [ 879.746095][ T28] do_syscall_64+0x49/0xb0 [ 879.772088][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 879.778019][ T28] RIP: 0033:0x7f649327bc9a [ 879.800836][ T28] RSP: 002b:00007ffeafaee5c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 879.820254][ T28] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f649327bc9a [ 879.828257][ T28] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 879.856856][ T28] RBP: 0000000000000032 R08: 0000001b31f20000 R09: 0000000000000244 [ 879.880294][ T28] R10: 00000000813292eb R11: 0000000000000293 R12: 00007f6492e000a8 [ 879.888290][ T28] R13: ffffffffffffffff R14: 00007f6492e00000 R15: 00000000000b2887 [ 879.910881][ T28] [ 879.914978][ T28] [ 879.914978][ T28] Showing all locks held in the system: [ 879.930250][ T28] 3 locks held by kworker/0:0/7: [ 879.935198][ T28] #0: ffff88802851f138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 879.990310][ T28] #1: ffffc900000c7d20 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.021374][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0x15/0x30 [ 880.040184][ T28] 2 locks held by kworker/u4:0/9: [ 880.045370][ T28] 1 lock held by rcu_tasks_kthre/12: [ 880.060246][ T28] #0: ffffffff8d12a490 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 880.090240][ T28] 1 lock held by rcu_tasks_trace/13: [ 880.095553][ T28] #0: ffffffff8d12ac90 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x29/0xe30 [ 880.117898][ T28] 2 locks held by kworker/1:1/26: [ 880.130909][ T28] 1 lock held by khungtaskd/28: [ 880.135788][ T28] #0: ffffffff8d12a2c0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 880.160289][ T28] 5 locks held by kworker/u4:4/56: [ 880.165452][ T28] 1 lock held by dhcpcd/3217: [ 880.170139][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: devinet_ioctl+0x2a5/0x1b20 [ 880.189365][ T28] 2 locks held by getty/3306: [ 880.210352][ T28] #0: ffff88814b7e7098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 880.230198][ T28] #1: ffffc900031262f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6a7/0x1db0 [ 880.250235][ T28] 3 locks held by kworker/0:7/3604: [ 880.255448][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.282721][ T28] #1: ffffc900043cfd20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.310297][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 880.331311][ T28] 3 locks held by kworker/0:8/3605: [ 880.336526][ T28] #0: ffff888012470d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.362495][ T28] #1: ffffc900043dfd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.390485][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 880.399500][ T28] 5 locks held by kworker/u4:5/3628: [ 880.420309][ T28] #0: ffff888012616938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.440235][ T28] #1: ffffc9000440fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.460937][ T28] #2: ffffffff8e289710 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 880.480237][ T28] #3: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0xd7/0x630 [ 880.500247][ T28] #4: ffffffff8d12f8b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3b0/0x8a0 [ 880.520397][ T28] 3 locks held by kworker/1:7/25849: [ 880.525738][ T28] #0: ffff88802851f138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.560363][ T28] #1: ffffc9000346fd20 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.590352][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_dad_work+0xcc/0x16b0 [ 880.599841][ T28] 4 locks held by kworker/1:12/25855: [ 880.616971][ T28] 1 lock held by syz-executor.4/27431: [ 880.630978][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 880.649654][ T28] 7 locks held by syz-executor.3/27504: 22:04:42 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 880.680999][ T28] #0: ffff888029bde460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x269/0xba0 [ 880.689947][ T28] #1: ffff888056095488 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 880.700348][ T3565] Bluetooth: hci14: command 0x041b tx timeout [ 880.732467][ T28] #2: ffff8881443c4578 (kn->active#51){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 880.743148][ T28] #3: ffffffff8dc086c8 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf8/0x480 [ 880.760047][ T28] #4: ffff8880540570e8 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xb6/0x880 [ 880.771183][ T28] #5: ffff8880540542f8 (&devlink->lock_key#6){+.+.}-{3:3}, at: nsim_drv_remove+0x54/0x160 [ 880.781666][ T28] #6: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: nsim_destroy+0x3a/0x140 [ 880.791667][ T28] 3 locks held by kworker/1:15/27687: [ 880.797058][ T28] #0: ffff888012471d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.809197][ T28] #1: ffffc9000368fd20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7a9/0x11d0 [ 880.820082][ T28] #2: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x8d/0xdb0 [ 880.829885][ T28] 1 lock held by syz-executor.2/29197: [ 880.836296][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 880.850345][ T28] 1 lock held by syz-executor.0/29220: [ 880.860098][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 880.869583][ T28] 1 lock held by syz-executor.4/29294: [ 880.880997][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 880.902067][ T28] 1 lock held by syz-executor.3/29301: [ 880.907547][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 880.930278][ T28] 1 lock held by syz-executor.2/29352: [ 880.935772][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 880.960347][ T28] 1 lock held by syz-executor.0/29361: [ 880.965830][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 880.980187][ T28] 1 lock held by syz-executor.4/29512: [ 880.985686][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 881.010856][ T28] 1 lock held by syz-executor.3/29520: [ 881.016341][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 881.026153][ T3565] Bluetooth: hci13: command 0x040f tx timeout [ 881.039496][ T28] 1 lock held by syz-executor.2/29568: [ 881.060280][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 881.069844][ T28] 1 lock held by syz-executor.0/29577: [ 881.084789][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 22:04:42 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000940)=""/88, 0x148, 0x58, 0x0, 0x7f}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x8, 0x8}, 0xc) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x5}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)='@', 0x1}, {&(0x7f0000000b40)='&', 0x1}], 0x2, &(0x7f0000000bc0)}, 0x20000094) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000001300)={r4}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000018c0)=@o_path={&(0x7f0000001880)='./file1\x00', 0x0, 0x2000, r1}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001900)={r4, r5}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x2, &(0x7f00000019c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x4000001}], &(0x7f0000000640)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r0, r1, r2], 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7, 0x0, r1, 0x8, '\x00', 0x0, r7, 0x0, 0x5, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d80)={{r0}, &(0x7f0000000d00), &(0x7f0000000d40)=r6}, 0x20) syz_clone(0x10d40000, &(0x7f0000000380)="1f9a29dc326998ede444b9e85ca4ee14c2088dc3394f", 0x16, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="5d04acf65c442aafdcb901f4d6eed72b728a9d8d0ccd5f2da1f8bdde6606d8f9d138919628ca") [ 881.130419][ T28] 1 lock held by syz-executor.1/29656: [ 881.135963][ T28] 2 locks held by syz-executor.1/29663: [ 881.190211][ T28] 2 locks held by syz-executor.1/29666: [ 881.195787][ T28] 3 locks held by syz-executor.1/29669: [ 881.220223][ T28] 3 locks held by syz-executor.1/29672: [ 881.225795][ T28] 1 lock held by syz-executor.1/29676: [ 881.250181][ T28] 3 locks held by syz-executor.1/29679: [ 881.255753][ T28] 2 locks held by syz-executor.1/29682: [ 881.270193][ T28] 3 locks held by syz-executor.1/29691: [ 881.275755][ T28] 2 locks held by syz-executor.1/29694: [ 881.300217][ T28] 2 locks held by syz-executor.1/29700: [ 881.305783][ T28] 2 locks held by syz-executor.1/29704: [ 881.320220][ T28] 3 locks held by syz-executor.1/29708: [ 881.325787][ T28] 3 locks held by syz-executor.1/29719: [ 881.340305][ T28] 2 locks held by syz-executor.1/29722: [ 881.345866][ T28] 1 lock held by syz-executor.4/29726: [ 881.380314][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 881.389764][ T28] 2 locks held by syz-executor.1/29727: [ 881.420287][ T28] 2 locks held by syz-executor.1/29733: [ 881.425867][ T28] 1 lock held by syz-executor.3/29734: [ 881.450219][ T28] #0: ffffffff8e295968 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x7c1/0xff0 [ 881.459681][ T28] 2 locks held by syz-executor.1/29740: [ 881.480180][ T28] 3 locks held by syz-executor.1/29743: [ 881.485750][ T28] 2 locks held by syz-executor.1/29746: [ 881.500226][ T28] 3 locks held by syz-executor.1/29749: [ 881.526260][ T28] [ 881.528625][ T28] ============================================= [ 881.528625][ T28] [ 881.550260][ T28] NMI backtrace for cpu 1 [ 881.554613][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 881.562432][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 881.572490][ T28] Call Trace: [ 881.575772][ T28] [ 881.578710][ T28] dump_stack_lvl+0x1e3/0x2cb [ 881.583413][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 881.588912][ T28] ? panic+0x75d/0x75d [ 881.592997][ T28] ? vprintk_emit+0x622/0x740 [ 881.597696][ T28] ? printk_sprint+0x490/0x490 [ 881.602476][ T28] ? nmi_cpu_backtrace+0x252/0x560 [ 881.607616][ T28] nmi_cpu_backtrace+0x4e1/0x560 [ 881.612578][ T28] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 881.618752][ T28] ? _printk+0xd1/0x111 [ 881.622930][ T28] ? panic+0x75d/0x75d [ 881.627025][ T28] ? __wake_up_klogd+0xcc/0x100 [ 881.631901][ T28] ? panic+0x75d/0x75d [ 881.635989][ T28] ? nmi_trigger_cpumask_backtrace+0xe2/0x3f0 [ 881.642069][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 881.648136][ T28] nmi_trigger_cpumask_backtrace+0x1b0/0x3f0 [ 881.654117][ T28] watchdog+0xf88/0xfd0 [ 881.658273][ T28] ? watchdog+0x1f8/0xfd0 [ 881.662605][ T28] kthread+0x28d/0x320 [ 881.666670][ T28] ? hungtask_pm_notify+0x50/0x50 [ 881.671689][ T28] ? kthread_blkcg+0xd0/0xd0 [ 881.676277][ T28] ret_from_fork+0x1f/0x30 [ 881.680700][ T28] [ 881.684448][ T28] Sending NMI from CPU 1 to CPUs 0: [ 881.689671][ C0] NMI backtrace for cpu 0 [ 881.689681][ C0] CPU: 0 PID: 26226 Comm: kworker/0:3 Not tainted 6.1.75-syzkaller #0 [ 881.689696][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 881.689706][ C0] Workqueue: events_power_efficient wg_ratelimiter_gc_entries [ 881.689727][ C0] RIP: 0010:lock_release+0x17a/0xa20 [ 881.689749][ C0] Code: eb 03 42 80 3c 3b 00 74 08 4c 89 f7 e8 df 60 77 00 4c 89 6c 24 48 48 c7 84 24 b0 00 00 00 00 00 00 00 9c 8f 84 24 b0 00 00 00 <42> 80 3c 3b 00 74 08 4c 89 f7 e8 37 60 77 00 4c 8b ac 24 b0 00 00 [ 881.689762][ C0] RSP: 0018:ffffc900039dfac0 EFLAGS: 00000246 [ 881.689774][ C0] RAX: 0000000000000000 RBX: 1ffff9200073bf6e RCX: ffffffff816a6ad7 [ 881.689785][ C0] RDX: 0000000000000000 RSI: ffffffff8b3cfae0 RDI: ffffffff8b3cfaa0 [ 881.689795][ C0] RBP: ffffc900039dfbe8 R08: dffffc0000000000 R09: fffffbfff1ce6a56 [ 881.689806][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff9200073bf64 [ 881.689816][ C0] R13: ffffffff85ae6337 R14: ffffc900039dfb70 R15: dffffc0000000000 [ 881.689827][ C0] FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 881.689840][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 881.689850][ C0] CR2: 0000555556f6f788 CR3: 000000000ce8e000 CR4: 00000000003506f0 [ 881.689864][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 881.689872][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 881.689881][ C0] Call Trace: [ 881.689886][ C0] [ 881.689892][ C0] ? nmi_cpu_backtrace+0x3de/0x560 [ 881.689914][ C0] ? read_lock_is_recursive+0x10/0x10 [ 881.689936][ C0] ? nmi_trigger_cpumask_backtrace+0x3f0/0x3f0 [ 881.689957][ C0] ? nmi_handle+0x25/0x440 [ 881.689986][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 881.690007][ C0] ? nmi_handle+0x12e/0x440 [ 881.690028][ C0] ? nmi_handle+0x25/0x440 [ 881.690049][ C0] ? lock_release+0x17a/0xa20 [ 881.690068][ C0] ? default_do_nmi+0x62/0x150 [ 881.690082][ C0] ? exc_nmi+0xab/0x120 [ 881.690095][ C0] ? end_repeat_nmi+0x16/0x31 [ 881.690116][ C0] ? wg_ratelimiter_gc_entries+0x3a7/0x470 [ 881.690134][ C0] ? lock_release+0xc7/0xa20 [ 881.690155][ C0] ? lock_release+0x17a/0xa20 [ 881.690173][ C0] ? lock_release+0x17a/0xa20 [ 881.690190][ C0] ? lock_release+0x17a/0xa20 [ 881.690208][ C0] [ 881.690212][ C0] [ 881.690219][ C0] ? wg_ratelimiter_gc_entries+0x3a7/0x470 [ 881.690234][ C0] ? do_raw_spin_lock+0x14a/0x370 [ 881.690250][ C0] ? __lock_acquire+0x1f80/0x1f80 [ 881.690273][ C0] ? do_raw_spin_unlock+0x137/0x8a0 [ 881.690291][ C0] _raw_spin_unlock+0x12/0x40 [ 881.690308][ C0] wg_ratelimiter_gc_entries+0x3a7/0x470 [ 881.690327][ C0] ? process_one_work+0x7a9/0x11d0 [ 881.690344][ C0] process_one_work+0x8a9/0x11d0 [ 881.690369][ C0] ? worker_detach_from_pool+0x260/0x260 [ 881.690388][ C0] ? _raw_spin_lock_irqsave+0x120/0x120 [ 881.690406][ C0] ? kthread_data+0x4e/0xc0 [ 881.690426][ C0] ? wq_worker_running+0x97/0x190 [ 881.690448][ C0] worker_thread+0xa47/0x1200 [ 881.690471][ C0] ? _raw_spin_unlock+0x40/0x40 [ 881.690488][ C0] ? release_firmware_map_entry+0x185/0x185 [ 881.690511][ C0] ? _raw_spin_unlock+0x40/0x40 [ 881.690534][ C0] kthread+0x28d/0x320 [ 881.690553][ C0] ? worker_clr_flags+0x190/0x190 [ 881.690568][ C0] ? kthread_blkcg+0xd0/0xd0 [ 881.690590][ C0] ret_from_fork+0x1f/0x30 [ 881.690616][ C0] [ 881.970188][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 881.970203][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.75-syzkaller #0 [ 881.970221][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 881.970230][ T28] Call Trace: [ 881.970235][ T28] [ 881.970242][ T28] dump_stack_lvl+0x1e3/0x2cb [ 881.970271][ T28] ? nf_tcp_handle_invalid+0x642/0x642 [ 881.970292][ T28] ? panic+0x75d/0x75d [ 881.970309][ T28] ? llist_add_batch+0x160/0x1d0 [ 881.970332][ T28] ? vscnprintf+0x59/0x80 [ 881.970351][ T28] panic+0x318/0x75d [ 881.970368][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 881.970391][ T28] ? memcpy_page_flushcache+0xfc/0xfc [ 881.970412][ T28] ? nmi_trigger_cpumask_backtrace+0x2c1/0x3f0 [ 881.970433][ T28] ? nmi_trigger_cpumask_backtrace+0x33a/0x3f0 [ 881.970457][ T28] ? nmi_trigger_cpumask_backtrace+0x33f/0x3f0 [ 881.970481][ T28] watchdog+0xfc7/0xfd0 [ 881.970505][ T28] ? watchdog+0x1f8/0xfd0 [ 881.970527][ T28] kthread+0x28d/0x320 [ 881.970547][ T28] ? hungtask_pm_notify+0x50/0x50 [ 881.970564][ T28] ? kthread_blkcg+0xd0/0xd0 [ 881.970587][ T28] ret_from_fork+0x1f/0x30 [ 881.970617][ T28] [ 881.973433][ T28] Kernel Offset: disabled [ 882.145472][ T28] Rebooting in 86400 seconds..