ocketpair(0xf, 0x3, 0xb6, &(0x7f0000000040)) 11:03:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x48, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r0}) 11:03:56 executing program 2: socketpair(0x2, 0x6, 0xd700, &(0x7f0000000000)) 11:03:56 executing program 0: socketpair(0xf, 0x3, 0xb7, &(0x7f0000000040)) 11:03:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4c, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0xb10667e3ba4aff84}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r0, r1, 0xb}, 0x10) 11:03:56 executing program 2: socketpair(0x2, 0x6, 0xd701, &(0x7f0000000000)) 11:03:56 executing program 0: socketpair(0xf, 0x3, 0xb8, &(0x7f0000000040)) 11:03:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:56 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001740)={0x11, 0x9, &(0x7f0000001580)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7ff}, @generic={0x6, 0xe, 0x3, 0x1, 0x1f}, @jmp={0x5, 0x0, 0x3, 0x4, 0xa, 0x2}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}]}, &(0x7f0000001600)='GPL\x00', 0x0, 0x6b, &(0x7f0000001640)=""/107, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000016c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001700)={0x0, 0x1, 0x494, 0xfffffffc}, 0x10}, 0x78) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000017c0)=r0) r1 = perf_event_open(&(0x7f0000001300)={0x0, 0x80, 0x5, 0x3f, 0x6, 0x7f, 0x0, 0x2, 0x504, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0xb21, 0x5}, 0x400, 0x7ff, 0x3f, 0x7, 0x179b, 0x7fffffff, 0x3, 0x0, 0x3, 0x0, 0xffffffffefffff0f}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001380)={0x8}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000001480), 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000014c0)=ANY=[@ANYBLOB="05000000000000000000000000000000000000960000000000000000"]) sendmsg$sock(r2, &(0x7f00000012c0)={&(0x7f0000000080)=@phonet={0x23, 0x2, 0x9b, 0x7}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000100)="dd19c7dcd664ad258d5e08abebf98d69988081858983b8237a07fe67792428b558bf12505bee53655745aca687a65677ce6f53a74e6904667d8d71cdf3", 0x3d}, {&(0x7f0000000140)="cdefbff61b8c8e3be1de576671ebd96d7088246353c683b3fb8f7e3391f158b524fc80dd9aad7c51a5ddacea9e443158d998415ebe0e6237f23f27dd0eaeeaed6e82257196b262512043426955bbdedac28a32b15a4c087f2048df6785b938671e80e7eee990fdf42e9553acdf00779e01194b8db9b266aaf333d9cee7a64257faefbe6704b0d8d72e64cd3f30dc536cda8a8108592154f851095045633a9fd38fae63b6a2dff81516a4f173", 0xac}, {&(0x7f0000000200)="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", 0x1000}], 0x3, &(0x7f0000001240)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x7a}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x78}, 0x8000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000cf40)={&(0x7f000000aa80)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ce40)=[{&(0x7f000000ab00)=""/4096, 0x1000}, {&(0x7f000000bb00)=""/211, 0xd3}, {&(0x7f000000bc00)=""/129, 0x81}, {&(0x7f000000bcc0)=""/255, 0xff}, {&(0x7f000000bdc0)=""/102, 0x66}, {&(0x7f000000be40)=""/4096, 0x1000}], 0x6, &(0x7f000000cec0)=""/85, 0x55}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000d000)={0x18, 0xf, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, [@func={0x85, 0x0, 0x1, 0x0, 0xfba7}, @call={0x85, 0x0, 0x0, 0x4e}, @exit, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @ldst={0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffff4}, @map={0x18, 0x3}, @map={0x18, 0x8, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbd4, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000001440)='syzkaller\x00', 0x94e, 0x0, 0x0, 0x41100, 0x8, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000cf80)={0x7, 0x2}, 0x8, 0x10, &(0x7f000000cfc0)={0x3, 0x4, 0x0, 0x9}, 0x10}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) r6 = gettid() sendmsg$unix(r5, &(0x7f0000004e00)={&(0x7f00000022c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{0x0}, {0x0}], 0x2, &(0x7f0000004d40)=[@cred={{0x1c, 0x1, 0x2, {r6}}}, @cred={{0x1c}}], 0x40}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={r6, r1, 0x0, 0x2, &(0x7f0000001500)='}\x00'}, 0x30) 11:03:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5d, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 2: socketpair(0x2, 0x6, 0xd800, &(0x7f0000000000)) 11:03:57 executing program 0: socketpair(0xf, 0x3, 0xb9, &(0x7f0000000040)) 11:03:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:57 executing program 5: socketpair(0x27, 0x800, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x3, 0x80000000, &(0x7f0000000040)) 11:03:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x68, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 2: socketpair(0x2, 0x6, 0xd801, &(0x7f0000000000)) 11:03:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x179, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 0: socketpair(0xf, 0x3, 0xba, &(0x7f0000000040)) 11:03:57 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:57 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x2, 0xfa, 0x8, 0xd7, 0x0, 0x5, 0x10100, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x100000000, 0xeca}, 0x1, 0x3, 0x2, 0x8, 0x6, 0x8, 0x101, 0x0, 0x0, 0x0, 0x2}, r0, 0x3, 0xffffffffffffffff, 0x1) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:03:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 2: socketpair(0x2, 0x6, 0xd900, &(0x7f0000000000)) 11:03:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1b5, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 0: socketpair(0xf, 0x3, 0xbb, &(0x7f0000000040)) 11:03:57 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x8, 0x0) 11:03:57 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:57 executing program 2: socketpair(0x2, 0x6, 0xd901, &(0x7f0000000000)) 11:03:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x74, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x295, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 0: socketpair(0xf, 0x3, 0xbc, &(0x7f0000000040)) 11:03:57 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:03:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x300, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/104, 0x68}, {&(0x7f0000000600)=""/95, 0x5f}, {&(0x7f0000000500)=""/121, 0x79}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000880)=""/191, 0x6d}, {&(0x7f00000006c0)=""/95, 0x5f}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/75}, {&(0x7f0000000940)=""/4096}, {&(0x7f0000001940)=""/252}, {&(0x7f0000001a40)=""/88}], 0x8}, 0x40012001) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="0b5e81a4710b0badc8fe67be9d0c22494dcc3c3fc926155d0e5eb53f77d2af60ef9f489d4fcbcf461d8d58e325ff5ebc6496dc33182a068ab7263c89115a9169c896eff760bd1445c3acb7b68c1d5dc97e9a777d0b240668715cfc3bfb5393be663636ca5cdf90905d94e0f95ba5abb65d9b9993654d9642516200a9825cb7cab89694a18f5c6b1c88113ae8ed44a9fdc9d2865d7a8481ee9f44f834a41e7d7ab91551d1ebfb12f9ad9f7148c1d81458b02e316dff7946835bf9dd23b8d165adf0d046e5612093e4", 0xc8}, {&(0x7f0000000140)="a8d45d4acbd1515b8db1511e21c870f8d7ce76d2950c08e66a9637881b7d8da734b7cd522413cf782941e33ae6381f3066ee0812599ea345a6e5400abc8705ac1e5c7c1791b09f63c2f328", 0x4b}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x2a}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0x50}, 0x0) 11:03:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:57 executing program 2: socketpair(0x2, 0x6, 0xda00, &(0x7f0000000000)) 11:03:57 executing program 0: socketpair(0xf, 0x3, 0xbd, &(0x7f0000000040)) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 2: socketpair(0x2, 0x6, 0xda01, &(0x7f0000000000)) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:03:58 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000040)) 11:03:58 executing program 0: socketpair(0xf, 0x3, 0xbe, &(0x7f0000000040)) 11:03:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x32d, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 2: socketpair(0x2, 0x6, 0xdb00, &(0x7f0000000000)) 11:03:58 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/214, 0xd6}], 0x1, &(0x7f0000000200)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x40) recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000300), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000380)=""/75, 0x4b}], 0x1, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x1) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:58 executing program 0: socketpair(0xf, 0x3, 0xbf, &(0x7f0000000040)) 11:03:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x351, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 2: socketpair(0x2, 0x6, 0xdb01, &(0x7f0000000000)) 11:03:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x390, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x40000) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/253, 0xfd}, {&(0x7f0000000140)=""/251, 0xfb}, {&(0x7f0000000240)=""/160, 0xa0}, {&(0x7f0000000300)=""/255, 0xff}, {&(0x7f0000000400)=""/36, 0x24}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/205, 0xcd}], 0x7, &(0x7f0000000600)=""/119, 0x77}, 0x10021) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:03:58 executing program 0: socketpair(0xf, 0x3, 0xc0, &(0x7f0000000040)) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 2: socketpair(0x2, 0x6, 0xdc00, &(0x7f0000000000)) 11:03:58 executing program 5: ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) 11:03:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3b9, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x179, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 0: socketpair(0xf, 0x3, 0xc1, &(0x7f0000000040)) 11:03:58 executing program 2: socketpair(0x2, 0x6, 0xdc01, &(0x7f0000000000)) 11:03:58 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:58 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x40000) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@rc={0x1f, @fixed}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000100)=""/12, 0xc}, {&(0x7f0000000140)=""/120, 0x78}], 0x3, &(0x7f0000000200)=""/87, 0x57}, 0x2000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x40000) sendmsg(r1, &(0x7f0000000cc0)={&(0x7f0000000340)=@isdn={0x22, 0x3, 0x9, 0x1, 0x7f}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)="7dc602206edca258ae2b9cec", 0xc}, {&(0x7f0000000400)="416016c072d317fb8d0aa7f278e9d176cb98c3680e4c25a308a1a09c377f058762d897f77db8b96916059330733bbb01bd7ee16f92902dfa9ced40651e5f1a4ee346ca7f63eea5dfe66d87dda30fb0c30a05b547cb3856f9b7b7a2d45de5fbc9f68476cf8bcb908a16867ae6b82eb5e0aeae07a6615edc9f1e3799da6d67820255080563628e8131d30991b66976ae85be80ddc72c01839b777fc7a90b75b52569782c2f19e580a6a71effebdc191e7e344ae3496185876c8710fc7a5e2372d73eb3660cf9d3e7329c3fa77f8e2c392f5111a711b96fc4ce91c39c6a", 0xdc}, {&(0x7f0000000500)="269b3bc82af462ec77dc71891b341b56953fa25afd53f8ce51831b5f56592f733f33f01d8eef01970beed7df1586cb0b702f169e7e25c64efdc48b47372dbe3940b51c8e860ca157d897b33c2ed759ad31ac65811a89a2731491b11800fe06fe8bf3d54ef754f95835", 0x69}, {&(0x7f0000000580)="4619aa661f558e78f7f7da5a3ab53212fecdcf3d8c222feea922471d3b0dda2336c58a3ca8a07c38287937d6d5c428bfda7739a0d220", 0x36}, {&(0x7f00000005c0)="86ca1a6993f303feea9fc0c3031a3015bc1d0d", 0x13}, {&(0x7f0000000600)="d181f731abeb3dda8fc05512cf2bf2351f21d62e009670e9bddbfcea91641567665a0a55b4dd0315749ef8126e1409c9994c33cf3bde559a3e3aa3fc27de819f7eb889653d170ec76a72a67162afc862ac8f6f52856d3fa4461302fe5635722049f31f868b641fa78e85fe290b6e02d501df8335bc1a9e01700c3c5c47841c4651ebdd40f3a0278fce", 0x89}, {&(0x7f00000006c0)="ba98ecab3fe5c302f8bfa2967b7d7f8ed76f79d6fa83e7735aba56f77e65b3d0f8466d0d9663dff9e60b09bad76e66319bb0e39d7f226f1287a8806c4feaca0fd6e8455d248ae79f460925e597fdf648ea25ddae765ab5cb119e813873b6e132a1ecda5759321632", 0x68}], 0x7, &(0x7f00000007c0)=[{0x70, 0x103, 0x40, "05eda309cd9a930461fcf3d160667490a7f5b5f0f2225bf9ac0b87e394097c07d1f7f61be7b849a68d74a8eb904d1f89c035638b0abcd6fcd4b18d4ba3a406b4b5d291e75afea0c9252dfae81356e82f38ebfb97eb8e9674290dda2f900c"}, {0x70, 0x835df90429fbf71c, 0x5, "f882a4fe53710b250d3e04bfae03f1f00b8695927fff506003f50cfacd040e6ae0238fe4c4c3c6e017177044b2cfa1875fc9364c5b891513892c2993fb6ac06fe06b05b4e003f12f9e3d099a5db0f5d15d82217c62cd64f093533819fb2748"}, {0x100, 0x6, 0x0, "7b83b6be1eeb75b1190d9a748c95524920dffb25b36ca49e4d2181d919dc4eb363fdbe040352fd585546339ef358573915bd2e339ef9e6adfce837998c1b72cdc524423282c5916e5e9cb225e45e3443ce3417e5df9c45a217e8186206cbce07447a9873530f32807c6239d1aa6ac4582a925684ab1d42a1163e45804fa18ea67479d5ab1870babed6890684b9944e19da2328d627ace4a84455ff0f4eb2e2e604bae8d8a446d04a8ae7ba65bacc157ac11b07d522a1e902799a9f5c194b83303fd462950c3fb26607021084427c5045552e7e0c1d4247f9c279ffaf081884650e9a6838417ec36e37a178d429f6"}, {0x110, 0x108, 0x6, "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"}, {0xf0, 0x111, 0x1, "4f034fb9e9502c33dc407a91fb7023a1c4b0dd314a3bdb29d614a7b29c461e97b9c5a8b626cf7ae7146db913b80e835ac6fc857ed4dbec5211125738299d9e49033b02cba97b03ab55c589efcdfe81a525ea8b89391cee31d17c5c56d2358e881e9d06070b2bc399f71ea9aedebb6ea59cb867b286fe0d69207ae0af0e16dfa32715e497d8e8ff23e46246ab550631e9821796b4c2bc8151fc0cbfdd9e6621354b3fc4b8d54b0568d71ad2b86cef3fc61f71f42a2675f3b73e25bd79cd2e3f5fe8d2ff2e766e29dfc36e69c0f8047db578327f6807a95230d39ab5fcfa8635e4"}, {0x38, 0x101, 0x3, "ed17805cfbc605acf7429da72163c6d5251addeb012dcd9bb0b6f6cac56bc1be73ce1ddfb91431"}, {0x58, 0x104, 0x8, "1adc3d1caac220899ae7ff1bd63533ecbc2f0e2f321367169bdf2c0b1fe60c1c6a157f49f9b1fec7955ab865a4f4eb67399f512e7a141e612f8d4a3af860548822b5f434dfb0a3"}, {0x68, 0x192, 0xe99, "53f09d4a66ea7c68e92301ea8e6b682ab2b3e25f963b8821d236b77cabc78eb015556ca9737fd1c0d093325d84cd72f8795f199a7c39ae0df2fbcc8424f2cf4accb2fa3f9407a0e082ece22a465632d02791d2fe8a"}], 0x4d8}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x480180, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000300)=0x1691) 11:03:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3cd, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1b5, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc2, &(0x7f0000000040)) 11:03:59 executing program 2: socketpair(0x2, 0x6, 0xdd00, &(0x7f0000000000)) 11:03:59 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3f9, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc3, &(0x7f0000000040)) 11:03:59 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x40000) sendmsg(r0, &(0x7f0000001c80)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x4, 0x0, {0xa, 0x4e21, 0x7866, @empty, 0x2}}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000140)="eda30554152668f36815f07f4683e765af52c7d42719c075d6a0524075aa008ab174d430ed03bb51ac165d6af08e0f6966bf81d828b7e173d01ab5e5490d456f2a786de3e44931dccd7d7f853b0e4bf0baf3dace417142359b7d5f591c93174703a772a43d9fdb7320aa77049143cea0a268dd00807f66c43c5f060faec80ab890d7a05e159bf7816d9380eebf3fc92d0bfd313019bc64f4578bfc459c917f07a81fc81004d60882a216e3bcc8728e85b82f9833320c6397e64d37c5f01ec6ffbac8d0bbfa25382fb1027fe93b10d719ca724bebfc49718c70d15a8ee046ffe0", 0xe0}, {&(0x7f0000000240)="b3cbe96219e6619cf9bbb4bf7a28f86be9097584fc5849cff856c009f82c2782a225fc6255a629eaa777ebb2551070295099828bb68d487e318ab8db3fdce235fe711a6ebbb7ba4746235c70e343a914ccfc24c4e1fe98426b1849ad1a8d77369104b2a33bdbbe2e5b242173feca52f9f501910970203099a447a8a0731575d12234aaee97f6cb1f61c6ffb66f2ee4d8", 0x90}, {&(0x7f0000000300)="0572a0ef3b73c6e468c1e9d24648542be0f04b0e19236834c8df7786900afdf0e8ee248275410cb8a7b7c5a959b99d717b56482fcc116d9e5acd9989cd71999727e41b0fd9ab688ffc2374a7549bec702b03f5fe8235609ef9791a8c0714e140c3c2cab31c6f4e48e7a1202f919184a42790cea42116eadee88f1470cfa66b15f624ad05d2f78fa16b2ebe34e6e1e032ec19928a7b4e", 0x96}, {&(0x7f00000003c0)="ec03a846f994c8a0475008183e4961481f7318dc02a6ae9434f6b41fa8ba24f50cab0d8b4579ee241cc00bc354a9447ef6500ba8a7951a73bf627decabf903db2fece12fbfec57fdf8f5723e11a40c0160a1d0a60e1c6985718610b0df272e0e4fc6dc49f93bf51fc537480c950bc68a67e30214", 0x74}, {&(0x7f0000000440)="e8b288fd592c02d54dce816baa6eff359eb00a00f36230aea3f257e56975532fcdb66ca307b15057a962ab9f779a2bdf", 0x30}, {&(0x7f0000000480)="a789e9a485e65e740b2d0b11740b488e92136bee362f9e8b52a7d51b52356863fc0e31fd6b578a50bbeb1cb0d9c231564ba1dcaf1776f39e5260ab4de8987e1bcbe9bea869e691afdd80d47c7397983b90c29a6a1e27245e576718ee43c9d367c9506c6d23d82eb5d464401eccf7514acff2544e207a1391bf04d84c183a05055142ffefba059b593bc1572fdb070b7e5c057e0868bea7efbbf4b21c1a17cb083275436c03fb07576e8455bc4eada321e01ab6fc566111d0ca204090a81f12ba04423a98026deb32fcdbba13aab0d77f7e8e2ff1", 0xd4}, {&(0x7f0000000580)="10f7ce11ea5811e74acb697275afefdb45b8fdae21a3717a6f395c1784a4ac6d4451da6a075ca0ede705474f5af0cbbed77dc2ac441a779de2f30950e95af415424c9ba2a116e6ab38ca05d95056f81971d29afc00fb4281767c1f7665c54bcf11e1c5e90c98c8e6b3cb8cae9457cf3b9df70cfd1cc93fe0aee8dc575d0336801a7c4e1a6ca457b2a8143b2a2a67419ccbb2f253891a46bfd1eafeb10b679cf2bbbce84681e28fc205673f409d36c29b432351897d73a809a927682cddd84a1a0c29e22c6c2500b51050549420", 0xcd}, {&(0x7f0000000680)="dbd69dd4e50934a9568480d21ce1efffb09e68181d5c96fdac3a1e63174575d52aadcdc7ee25dc16c6d9adfd5f8d0e18f8be4254a837c670e343d337747072fad9b99e642c5e1774643676627550dfdbbd7577e9061e9b66ecae4b002486054e3deb5ff7d48cce26fe98e56f7e6840929b2076fda164dfaee5ee881417", 0x7d}], 0x8, &(0x7f0000000780)=[{0xa8, 0x84, 0x7, "f607ae9e2479851b409a329eab4d8269df502508b8a2b47a561918da4f348abb7ddc053db97adb149237ddc3df138838d181dc4361ab8b47875f8e78ece644bb802a605a06cdee73870ea6bf82aabbdf1bfc1c62f1edada6d899204313e50da743ee58132a60eea3cf9e7215f2c4d493e51096c469f9f78cfd5e9f03be3b46d2ebbfb34898f5d442ee8b17aedd9b72a7f0ed"}, {0x28, 0x113, 0x9, "aee0cc9f8e6d84925907952e861adf282ae16708d8"}, {0x1010, 0x5, 0x6e, "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"}, {0xa8, 0x102, 0x1f, "7b1c597daf1c7d8f86a6af4351b2c7af7495d7506c5caeffdddae9b0976be975dfa711736e930f74cfc7c6e7acb85c8da6a4ab5c921fee78b51ec830f201f3fb50b82896eae6e452db5492bce4efa7a8da7c945d491244a2d71438c3b72530f6156d9c1c1711c6cd7ec66153d6249c9fad534f108f70579ef9cdd5578f8dcc3a2efb18e64c617104f11b4e1879db25fab679db"}, {0x90, 0x10a, 0x7fffffff, "500b6084bf5048da737ae9e374237cb983062d764a5642460db4250a21e4c1277f288a80dd562b25fb09b3a205825d2f1b986d7f7c225b5ed21d8e87f24e4cf73cf564a17a83a8a8e804630ab2e41eee56a850e31dd2493a2d8ee903150f4cad3c1928768bb9d4b10e002a972dbf1587a297d969d55a67464fc5c60f12"}, {0xc0, 0x84, 0x0, "34e1bdebe2683a3bc568e25b961322f9b39243c3a632c21fcf18c581f4aa25778bd161a1db32da647c3cba6e3266634bb33839b69957e1f698cb3c216947f7120bb740ad59a2cbddb569a42ed41c5dd481a48462fbd174c5038d54317511dc6cf426d1c3c3ea294cce87f0fb56d9dacc22b4ab90b02137ef02b3801180317ec11adc119438ab2d2e60a746e070a5ba73443deca3860283f22c25b9025ab81fb4ddc0f14c73ae26ae006b22d6f6"}, {0xf8, 0x18, 0x400, "45685f25e0d030a7a09b809a1655042ac3550c5a187aed07c78f43eee256d34ebe4263e92862b440b1434a639e45a9946da10773087bdbd11689524754938fcedcc96101fe3fa8522f1c56b30d6f0076bea476d32c5cfb27a05ef43ff4e64d39508378a78e98933a3bc527fa6f06b6d0f1bdeaf58cd15c2134f7f85913ece283e0db39dee8f9ea09a8a50c611371d6a3a512e892295ef10db4529510b5a142b06c48516c4a49a889d152a932008e0831cae4aa4499f3b6ec1c471e3f199141bfbe1ffe093e4c9511de97dc2f156fc943c263f1f04a57f0d15d247515e2fd87b78040c2044ef65c26"}, {0x68, 0x110, 0x0, "d68ec7a3033bf3e92f663bbc439dce9882ba649fd97b22c45f721bac3388fa4d55bf4b94e01324f1a6e11ed6a64d0437d0f63d8d9e69c14b9570642cad1594ccf788f44a477667316cd5e47b9bd4b969aabb16"}, {0xc0, 0x11, 0x5af, "e7ef88f18df44a6c11bb5488f2a91ea7a9dadede411915f706442312b897737d1262aaa4a8dfe877df4f70fabf8b8100be158cba9071a9d68ed1c2e94649c92fa100eefb8be259f64f5e6f71fe83d787cfd47492982cd31c35f0a7c9c33c63fe8b15127d0cc759e9182b26abb380bc9c464c20cccd1a6959018d727ff58c72f658b4a2962e8ba9aad4fd995c67dc4f7aa49f4aec22cd87c6c9a3e9ff5a5c3825c524ff1f6b222aace60bee1aee56"}], 0x14f8}, 0x800) 11:03:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x295, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 2: socketpair(0x2, 0x6, 0xdd01, &(0x7f0000000000)) 11:03:59 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:03:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x500, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 5: socketpair(0x23, 0x3, 0x0, &(0x7f0000000000)) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc4, &(0x7f0000000040)) 11:03:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x300, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 2: socketpair(0x2, 0x6, 0xde00, &(0x7f0000000000)) 11:03:59 executing program 4: socketpair(0x2, 0x6, 0xdd00, &(0x7f0000000000)) 11:03:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x600, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc5, &(0x7f0000000040)) 11:03:59 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001380)) r2 = socket$kcm(0x29, 0x4, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)={r0}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x40000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r4}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r5, 0xffffffd2) 11:03:59 executing program 2: socketpair(0x2, 0x6, 0xde01, &(0x7f0000000000)) 11:03:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x32d, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 4: socketpair(0x2, 0x6, 0xdb01, &(0x7f0000000000)) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc6, &(0x7f0000000040)) 11:03:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x700, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 2: socketpair(0x2, 0x6, 0xdf00, &(0x7f0000000000)) 11:03:59 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x300, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 5: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xfffffffffffffffe) 11:03:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x351, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:03:59 executing program 0: socketpair(0xf, 0x3, 0xc7, &(0x7f0000000040)) 11:04:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xa00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xdf01, &(0x7f0000000000)) 11:04:00 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 5: socketpair(0x15, 0x2, 0x0, &(0x7f0000000040)) 11:04:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x390, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 0: socketpair(0xf, 0x3, 0xc8, &(0x7f0000000040)) 11:04:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1085, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xe000, &(0x7f0000000000)) 11:04:00 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x74, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x4) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:00 executing program 0: socketpair(0xf, 0x3, 0xc9, &(0x7f0000000040)) 11:04:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3b9, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1840, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xe001, &(0x7f0000000000)) 11:04:00 executing program 4: socketpair(0x21, 0x1, 0x2, &(0x7f0000000000)) 11:04:00 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f0000000500)='./file0\x00', 0x1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="082b4462ce50c7ea00deb307f8977f0d375246a74952bf55304add2daee933a536e4932d304529c0afab95fe6b333b0554ba83030c9f92fdae370eb55de96c114698c869f26deefe3a1b945f67d32be1e9babc5c9ee1dd23e29c474e8066afd823f08463cf62f6cf0a9c4eca1ac70688dc3456e86da9e85d19dbd0c5433695731722359fd6a791a062a75e4c84c92e98b07ce36b404d839a175fe48fa020b484b6c6808b4c705ec70cc42d6aed", &(0x7f0000000140)=""/98}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000480)={&(0x7f0000000300)="fca6b89cec01e9", &(0x7f0000000340)=""/204, &(0x7f0000000540)="4a45c97cd67d5f53f13419ad9e7697831ed8d38bdaac549c69906c41a665fbdf54aa9f963bc425161e918f1cb4ac51e425369bfb285d579ad510afa0d4363ce36edd29a624f9d911ea64e9a0da1ad762bcbbe73c182766fa9b7b43283eb6f2dbb92b67b33cd631609c8f0a51094227144c1ce300acee8eff43fffb30b26e73a382750d689a802d7a0f79d5b2763bf4a14a4cad73ce4a15f07b77b50d70c98094", &(0x7f0000000440)="d1b031574a0a48a8e059c9e5b08b9dbd8528d6ca9570bf230f6673e526d89b91d84a4d4f31b870a70db97a182993af32f026", 0x4d49, 0xffffffffffffffff, 0x4}, 0x38) socketpair(0xa, 0x3, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000200)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10, &(0x7f00000005c0), 0x0, &(0x7f0000000240)=[@ip_retopts={{0x54, 0x0, 0x7, {[@end, @generic={0x94, 0x12, "e960fdd8ea3b23fa51c999d5167c95b2"}, @generic={0x86, 0x12, "17b8e277107dcd719c5850fa80b3c811"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x19, 0x3, [{0x2, 0x7, "562a480b83"}, {0x6, 0xc, "2f8eb445f564c3feadc3"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x55}}, @ip_ttl={{0x14}}], 0x88}, 0x4) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) sendmsg$sock(r0, &(0x7f0000000b40)={&(0x7f0000000740)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000007c0)="b63fb3cdc0e86ef874f3744e2dfa809fe850a17e4cc13ff19d73f37dd9c00c1bc4af13130e611730ac033698ea9f82ba2fc09ea71dbf59d75c8c24ddc94e18bf4aaaa75429603e1333626f3001d0f699271886bae6f4fb14cd93781196d72de779d70688e0ad650df9e05f19ef9be2a447e8a9577e1e39b316e2f7a5c8887dba102c802ceadab81b8fa883cd2835dc15c3904af0faf7f9d67a30c851117a16242f22cd9a1925c09ca5a8cd9b6089c9edfbde4307a9d67aa6f3696ef3b899ede3fa7c568fa007f2708c4d5b17b40394cb9f9eb60a79084777dc897591d0481de0a2cfc99134f5f7efdacc7e18e1fa", 0xee}, {&(0x7f00000008c0)="93898a64913e76418d17134fb11dfead8b3b824722f188389266eec6807dc3d57505430af044c57eee431e7853acc7c495fa656d91131b3cd223d51ab149f495185fcc15fd0b983f3b70e0f0a3bc747dab1b9144364d66f6d0cf20cc847c9b62f0338358275a4e950e49ee285ba6c45e8607517e6c214181b5c428b7bec9fed9510bbde23f4a7c0fe4c64f0d43dbd07581d4921c6c65aefe34db401a572897003b6545acdad2389ae3375e01cb706ced384b1f479f747384", 0xb8}, {&(0x7f0000000980)="bf196fb27943a4173b3d4ce81dbc8ec3704dec310346f879496ac1f19334e3cc1eae7f40c07a7b2127391bf6136d9bef3908cefed1c4b25aeb4fbb6a33d64cdd83b0e18cd3391d1723d13781d889994f47fc690b5dd37001e816c87dce256fcc0db881c6d2af16ebe8489e1a5724212eccd1f06c9afec81ecdd540598a1a1e46e1625c2b66203a7eac939a41ea819e3260a8c04229ecd66262d30b205bbbfa63d27dca2ad1ee825ea31c01a06ac26bd7cc477332da16bef46cc61fcf420a5d77e8a9fb8e", 0xc4}, {&(0x7f0000000a80)="5312bd5ebe", 0x5}], 0x4, &(0x7f0000000b00)}, 0x801) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)) 11:04:00 executing program 0: socketpair(0xf, 0x3, 0xca, &(0x7f0000000040)) 11:04:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3cd, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1f00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xe100, &(0x7f0000000000)) 11:04:00 executing program 4: socketpair(0x21, 0x1, 0x2, &(0x7f0000000000)) 11:04:00 executing program 0: socketpair(0xf, 0x3, 0xcb, &(0x7f0000000040)) 11:04:00 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) 11:04:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3f9, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xe101, &(0x7f0000000000)) 11:04:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:00 executing program 4: socketpair(0x21, 0x1, 0x2, &(0x7f0000000000)) 11:04:00 executing program 0: socketpair(0xf, 0x3, 0xcc, &(0x7f0000000040)) 11:04:00 executing program 2: socketpair(0x2, 0x6, 0xe200, &(0x7f0000000000)) 11:04:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x500, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x12, 0x6, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x28d8, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x26}, @alu={0x4, 0x0, 0xc, 0xa, 0x9, 0x7a2572f6439fad76, 0xfffffffffffffff0}], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000100)=""/4096, 0x41000, 0x11, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000001100)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001140)={0x4, 0x0, 0x8, 0xf2}, 0x10}, 0x78) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001400)=@bpf_lsm={0x1d, 0x7, &(0x7f0000001200)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0x1, 0x6, 0xa, 0x6, 0x18, 0x10}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3dd}], &(0x7f0000001240)='GPL\x00', 0x80000000, 0xf0, &(0x7f0000001280)=""/240, 0x41100, 0x5, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000013c0)={0x0, 0xa, 0x80000000, 0xa580}, 0x10, 0xffffffffffffffff}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r1}, 0x9) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000014c0), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000001480)=r0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x3f) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000013ac0)={&(0x7f0000012600)=@can={0x1d, 0x0}, 0x80, &(0x7f0000013a40)=[{&(0x7f0000012680)=""/212, 0xd4}, {&(0x7f0000012780)=""/118, 0x76}, {&(0x7f0000012800)=""/244, 0xf4}, {&(0x7f0000012900)=""/4096, 0x1000}, {&(0x7f0000013900)=""/214, 0xd6}, {&(0x7f0000013a00)=""/22, 0x16}], 0x6}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000013b00)={0x8, 0x0, 0x5e0cfcd1, 0x3f, 0x4, 0xffffffffffffffff, 0x3, '\x00', r3, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x40) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2085, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 4: socketpair(0x0, 0x1, 0x2, &(0x7f0000000000)) 11:04:01 executing program 2: socketpair(0x2, 0x6, 0xe201, &(0x7f0000000000)) 11:04:01 executing program 0: socketpair(0xf, 0x3, 0xcd, &(0x7f0000000040)) 11:04:01 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) [ 2405.457387][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 2405.463763][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 11:04:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x600, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 2: socketpair(0x2, 0x6, 0xe300, &(0x7f0000000000)) 11:04:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2d03, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 0: socketpair(0xf, 0x3, 0xce, &(0x7f0000000040)) 11:04:01 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003300)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000003200)=[{&(0x7f00000000c0)=""/220, 0xdc}, {&(0x7f00000001c0)}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/4096, 0x1000}], 0x5, &(0x7f0000003280)=""/111, 0x6f}, 0x160) 11:04:01 executing program 4: socketpair(0x0, 0x1, 0x2, &(0x7f0000000000)) 11:04:01 executing program 2: socketpair(0x2, 0x6, 0xe301, &(0x7f0000000000)) 11:04:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x700, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4018, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 0: socketpair(0xf, 0x3, 0xcf, &(0x7f0000000040)) 11:04:01 executing program 5: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7c63, 0x0, 0x0, 0x0, 0x4}, [@generic={0x1, 0x5, 0x3, 0xb65a, 0x80000001}, @generic={0x20, 0x1, 0x9, 0x16be, 0x6}]}, &(0x7f0000000080)='syzkaller\x00', 0x1f, 0x1b, &(0x7f00000000c0)=""/27, 0x41000, 0x1, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000000140)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x9, 0x9, 0x1}, 0x10, r1}, 0x78) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4800, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 4: socketpair(0x0, 0x1, 0x2, &(0x7f0000000000)) 11:04:01 executing program 2: socketpair(0x2, 0x6, 0xe400, &(0x7f0000000000)) 11:04:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xa00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4c00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 0: socketpair(0xf, 0x3, 0xd0, &(0x7f0000000040)) 11:04:01 executing program 4: socketpair(0x21, 0x0, 0x2, &(0x7f0000000000)) 11:04:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1085, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:01 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'gretap0\x00'}) 11:04:01 executing program 2: socketpair(0x2, 0x6, 0xe401, &(0x7f0000000000)) 11:04:02 executing program 0: socketpair(0xf, 0x3, 0xd1, &(0x7f0000000040)) 11:04:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5103, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000000)) 11:04:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1840, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 2: socketpair(0x2, 0x6, 0xe500, &(0x7f0000000000)) 11:04:02 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x2, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffe5, 0x0, 0x0, 0x0, 0x168}], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x1, 0x7, 0x4, 0x3}, 0x10}, 0x78) 11:04:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5d00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 0: socketpair(0xf, 0x3, 0xd2, &(0x7f0000000040)) 11:04:02 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000000)) 11:04:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1f00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 2: socketpair(0x2, 0x6, 0xe501, &(0x7f0000000000)) 11:04:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000001380)={0x3, &(0x7f0000001340)=[{0x3, 0x2, 0x0, 0x800000}, {0x5, 0x8, 0x32, 0x9}, {0x400, 0x1, 0x5, 0x5}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='devices.list\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file1\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001280)={r1, &(0x7f0000000180)="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", &(0x7f0000001180)=""/250}, 0x20) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={0xffffffffffffffff, 0x3, 0x8}, 0xc) 11:04:02 executing program 0: socketpair(0xf, 0x3, 0xd3, &(0x7f0000000040)) 11:04:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6800, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 4: socketpair(0x21, 0x0, 0x0, &(0x7f0000000000)) 11:04:02 executing program 2: socketpair(0x2, 0x6, 0xe600, &(0x7f0000000000)) 11:04:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 0: socketpair(0xf, 0x3, 0xd4, &(0x7f0000000040)) 11:04:02 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001380)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r2}) 11:04:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 4: socketpair(0x21, 0x0, 0x2, 0x0) 11:04:02 executing program 2: socketpair(0x2, 0x6, 0xe601, &(0x7f0000000000)) 11:04:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2085, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 0: socketpair(0xf, 0x3, 0xd5, &(0x7f0000000040)) 11:04:02 executing program 4: socketpair(0x21, 0x0, 0x2, 0x0) 11:04:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7400, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:02 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x40000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) 11:04:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2d03, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 2: socketpair(0x2, 0x6, 0xe700, &(0x7f0000000000)) 11:04:03 executing program 0: socketpair(0xf, 0x3, 0xd6, &(0x7f0000000040)) 11:04:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7901, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 4: socketpair(0x21, 0x0, 0x2, 0x0) 11:04:03 executing program 5: ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:03 executing program 2: socketpair(0x2, 0x6, 0xe701, &(0x7f0000000000)) 11:04:03 executing program 0: socketpair(0xf, 0x3, 0xd7, &(0x7f0000000040)) 11:04:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4018, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 2: socketpair(0x2, 0x6, 0xe800, &(0x7f0000000000)) 11:04:03 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1840, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 5: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000040), 0x6e, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000140)=""/131, 0x83}, {&(0x7f0000000200)=""/102, 0x66}, {&(0x7f0000000280)=""/125, 0x7d}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f0000000540)=""/135, 0x87}, {&(0x7f0000000600)=""/55, 0x37}, {&(0x7f0000000640)=""/145, 0x91}], 0xa, &(0x7f00000007c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x48}, 0x22) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:03 executing program 0: socketpair(0xf, 0x3, 0xd8, &(0x7f0000000040)) 11:04:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4800, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8100, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000004e00)={&(0x7f00000022c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{0x0}, {0x0}], 0x2}, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000040)) 11:04:03 executing program 2: socketpair(0x2, 0x6, 0xe801, &(0x7f0000000000)) 11:04:03 executing program 0: socketpair(0xf, 0x3, 0xd9, &(0x7f0000000040)) 11:04:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4c00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 2: socketpair(0x2, 0x6, 0xe900, &(0x7f0000000000)) 11:04:03 executing program 4: socketpair(0xf, 0x3, 0xd1, &(0x7f0000000040)) 11:04:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8500, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000040)=0x728) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/170, 0xaa}, {&(0x7f00000001c0)=""/48, 0x30}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/91, 0x5b}], 0x4, &(0x7f0000000340)=""/139, 0x8b}, 0x10003) 11:04:03 executing program 0: socketpair(0xf, 0x3, 0xda, &(0x7f0000000040)) 11:04:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5103, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:03 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3cd, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8510, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 2: socketpair(0x2, 0x6, 0xe901, &(0x7f0000000000)) 11:04:04 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000040)="8561244937de5476455e29dab03e83403915e85ed94ef8727b6dc2a02db4b3a5566040cda1bfbbeae5edc87301ed1a2e73317912db08f5e2417654586c34cea7845181d9aec3c0bf735cf9a12a209f5a260e019a758d40b4a791100973966ce7e7700562d01df09a29812feeaf818a596c7f7286b3de38e4c2a055c5c125a5536b3bd9", &(0x7f0000000100)=""/52, &(0x7f0000000140)="f3356dc540b4188699fc0ef9528041f5dfb10911512c3e718b4d6663ad39033924abaf33370dcd4131a71be3d4fecdc7b2de160d2c6ce872409e3262b7f6032b702c6844603fc245eaad35022c245456f4c9ebeb85dfe598b11526fba8088f09707af4391a73c3f8fd716e00", &(0x7f00000001c0)="51341328f8cd5a2f416303373ea38d6452df85443b5c23bad97eb13b3f4c2508888d", 0x9a29, r0}, 0x38) 11:04:04 executing program 0: socketpair(0xf, 0x3, 0xdb, &(0x7f0000000040)) 11:04:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5d00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f0000000500)='./file0\x00', 0x1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="082b4462ce50c7ea00deb307f8977f0d375246a74952bf55304add2daee933a536e4932d304529c0afab95fe6b333b0554ba83030c9f92fdae370eb55de96c114698c869f26deefe3a1b945f67d32be1e9babc5c9ee1dd23e29c474e8066afd823f08463cf62f6cf0a9c4eca1ac70688dc3456e86da9e85d19dbd0c5433695731722359fd6a791a062a75e4c84c92e98b07ce36b404d839a175fe48fa020b484b6c6808b4c705ec70cc42d6aed", &(0x7f0000000140)=""/98}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000480)={&(0x7f0000000300)="fca6b89cec01e9", &(0x7f0000000340)=""/204, &(0x7f0000000540)="4a45c97cd67d5f53f13419ad9e7697831ed8d38bdaac549c69906c41a665fbdf54aa9f963bc425161e918f1cb4ac51e425369bfb285d579ad510afa0d4363ce36edd29a624f9d911ea64e9a0da1ad762bcbbe73c182766fa9b7b43283eb6f2dbb92b67b33cd631609c8f0a51094227144c1ce300acee8eff43fffb30b26e73a382750d689a802d7a0f79d5b2763bf4a14a4cad73ce4a15f07b77b50d70c98094", &(0x7f0000000440)="d1b031574a0a48a8e059c9e5b08b9dbd8528d6ca9570bf230f6673e526d89b91d84a4d4f31b870a70db97a182993af32f026", 0x4d49, 0xffffffffffffffff, 0x4}, 0x38) socketpair(0xa, 0x3, 0xffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000200)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10, &(0x7f00000005c0), 0x0, &(0x7f0000000240)=[@ip_retopts={{0x54, 0x0, 0x7, {[@end, @generic={0x94, 0x12, "e960fdd8ea3b23fa51c999d5167c95b2"}, @generic={0x86, 0x12, "17b8e277107dcd719c5850fa80b3c811"}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x19, 0x3, [{0x2, 0x7, "562a480b83"}, {0x6, 0xc, "2f8eb445f564c3feadc3"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x55}}, @ip_ttl={{0x14}}], 0x88}, 0x4) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) sendmsg$sock(r0, &(0x7f0000000b40)={&(0x7f0000000740)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000007c0)="b63fb3cdc0e86ef874f3744e2dfa809fe850a17e4cc13ff19d73f37dd9c00c1bc4af13130e611730ac033698ea9f82ba2fc09ea71dbf59d75c8c24ddc94e18bf4aaaa75429603e1333626f3001d0f699271886bae6f4fb14cd93781196d72de779d70688e0ad650df9e05f19ef9be2a447e8a9577e1e39b316e2f7a5c8887dba102c802ceadab81b8fa883cd2835dc15c3904af0faf7f9d67a30c851117a16242f22cd9a1925c09ca5a8cd9b6089c9edfbde4307a9d67aa6f3696ef3b899ede3fa7c568fa007f2708c4d5b17b40394cb9f9eb60a79084777dc897591d0481de0a2cfc99134f5f7efdacc7e18e1fa", 0xee}, {&(0x7f00000008c0)="93898a64913e76418d17134fb11dfead8b3b824722f188389266eec6807dc3d57505430af044c57eee431e7853acc7c495fa656d91131b3cd223d51ab149f495185fcc15fd0b983f3b70e0f0a3bc747dab1b9144364d66f6d0cf20cc847c9b62f0338358275a4e950e49ee285ba6c45e8607517e6c214181b5c428b7bec9fed9510bbde23f4a7c0fe4c64f0d43dbd07581d4921c6c65aefe34db401a572897003b6545acdad2389ae3375e01cb706ced384b1f479f747384", 0xb8}, {&(0x7f0000000980)="bf196fb27943a4173b3d4ce81dbc8ec3704dec310346f879496ac1f19334e3cc1eae7f40c07a7b2127391bf6136d9bef3908cefed1c4b25aeb4fbb6a33d64cdd83b0e18cd3391d1723d13781d889994f47fc690b5dd37001e816c87dce256fcc0db881c6d2af16ebe8489e1a5724212eccd1f06c9afec81ecdd540598a1a1e46e1625c2b66203a7eac939a41ea819e3260a8c04229ecd66262d30b205bbbfa63d27dca2ad1ee825ea31c01a06ac26bd7cc477332da16bef46cc61fcf420a5d77e8a9fb8e", 0xc4}, {&(0x7f0000000a80)="5312bd5ebe", 0x5}], 0x4, &(0x7f0000000b00)}, 0x801) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)) 11:04:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8520, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 2: socketpair(0x2, 0x6, 0xea00, &(0x7f0000000000)) 11:04:04 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r2, &(0x7f0000002880)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @empty}, 0x4, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000100)="b951ae28b4c541edef7181c946e14576bb33c81a3de85457376cec76374e52b4d0e5050dd7e8c7a4eb18ae057c9145b8b973e6330f431e2866db1b3ae000db6a8e0d5109ffbb75d2ee3a72fe149e992049354d533558d0b5f134c3b13c73906e5daa0d160d70cd2c7ce13307e5e314f942e857535f9a07052a8718fea1722496c372f33c4030fce8dc53674ed6a7ee71213e5acb06fddf1b1211a7c11d5b41c9414e5609f82bbb0e2537dcf35a1a674f51e08a36270959cd00a15830e3fca440444064", 0xc3}, {&(0x7f0000000200)="394250c8948d12bf431be0feda55bd5f65d79e3777b13b96aa15a09d47d78caa96adbff433182e6a3d32d90a5517422c58c987ee8857dfa50c5937daeb7b2ea05b1705241c6abbf1128d75a9adcedece67257a16b18ff81a6517aff26e484d5c7b3c53198e3512ab58906d85e2fcb0b3970aa2539285239a954514968188a5b4489ab7cb01eb388cf35228ee57f6f2b9f027b91060afab36e432bff615c765e31955327bff3b9038fb6cb2346b864fcc790500723914cc83b558ef0e63e822370c489fcc1fd39c51da0dee93ecb20ef93e43c54a29934d250cf7", 0xda}, {&(0x7f0000000300)="1d8226d7890617b54a6d4b0d9a8a86e21ede14f62f0f9c811be8b2e8c8e0c05337dc792af941878d0a75b1f90defa501a276bb41b4ef0f4fd5b2f4dc21c51cdccae41eae37e0ec65c427a9e5432919b60442553102fef835cb45f5d4399de88edffb3362ad9bad09eed948b66073f0e0614a0c77a975bd48efa4da94766314458a9a9893993a5cbf2e671fe3d5e90da7aab9d677fc209db4fe179972a92cd93161131638d2e94ca9e7b03eeab1f277981fbb3396682e31aaa44d064fada3d7160bbb34a6df993adaa691f0ac9f65871052afba", 0xd3}, {&(0x7f0000000400)="1ef23689e3edcb51b841436f1770641dae78b6a6113c6ecbd541732b415f7224bb0600d377bb691b409cec6d83cb2c7e38493d32e746562d70cb097553dbc9bec9c9f1bdfdb96b44989cf08eac41731043a367fffdab2bb13814b2d1e47e54805a862e7c9a48bd80e3e141d373a31e07575d267da166fd6020e7e2c7c43ac04988ad821f687226927f22af30fe63573adaeb8fe6ac45261a271fb6e95400634ef4deedea7e88fba0d73ecc3c834fc8720a4a5aafe7f575743e6a03e9ff7031d1b2", 0xc1}, {&(0x7f0000000500)="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", 0x1000}], 0x5, &(0x7f0000001580)=[{0xa0, 0x117, 0x10001, "67ef44d80484422e7a80a0743287f045209f0f6ddcb73097d0433e803dbda22d4a7d05c4360b7eea1bbdba9c219187139c462146869320f62d3e0a69665a26b18bfad7df273cc5a5e5da26e182bc91c604d7810818a43bbcb194f0ac48e078ba0760fd45849f90f244e7a58adfb914bc3ce1d60243f8302ed575e5299dc91e7831730d44e7a361b979"}, {0x108, 0x108, 0xb0b0, "e7fe7064fc3dadf9be4ad1eead52d48d40e7585de6e5245dd0b85a0beb6213d3da5cbf39f49585355ff2dce1b613f79cb3cd8e02d8133a38449c505e2460273ee86de091f6d70173a41a10259e6fb6a0d8370e2b2a89c439a5f01f644039072d3b99facce0c37cd2a36b268d5c036769bdc47cfb57fcc5f3634ccc528e5975e5d36250720944d5c80e931c1fb3cb598b9d120408a57d9ab7b6f78bd45f85c576f7314b14657bb907d7faa914bb07c30754fc34d7cf3d0d1381cc6e96e16caec13ae85cc092da40b19e0f98747f9ee391ca8a53ebcb43f24c6d5d0b4d7d3f132ba4f9ac3036d0d99589cc936e3c1d0de61c"}, {0xc8, 0x110, 0xfffffffe, "eea00e0bffa4c5f53f1cb82d0d852212247d9c71f8ec753b272090e991453bfd33781df555d3d8f40c2504ca5312e0b7cf1d1a836f66df165ad44ce9a6deed6cee0961e3b9cedc38062c389c3713306a85cf80cbf8969f32c049b0d23cb26694f7d9ebeb9dd3efb75855de7c25aedcb70a2e323b767809194d57868e564227b4959b5031abfece0abed5f0dbdc540ad55d0d174b01be3345189ce347f908fbb2468e22ce36819f1b9a8acdbd9f1d771f1a0125f80598"}, {0x78, 0x10f, 0x5, "caf63d94ca710822ebf6cd977b7110469a66afdc3bbb89d0f319ca86d23d1e065136cf7a610dc9d32988e52096ea63d08388befd4662b44951c857ec31d0edd9f4d03e03145a0dd8b84fc5f1b0e4dc52de2b66b3f0dacaa777fcad7f31e4072b2ac8b8"}, {0x1010, 0x10d, 0x0, "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"}], 0x12f8}, 0x40) 11:04:04 executing program 0: socketpair(0xf, 0x3, 0xdc, &(0x7f0000000040)) 11:04:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6800, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000003980)={r2}) 11:04:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x9003, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 2: socketpair(0x2, 0x6, 0xea01, &(0x7f0000000000)) 11:04:04 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x1, 0x80, 0x6, 0x7, 0x0, 0x5, 0x20022, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040)}, 0x2000, 0x6, 0x0, 0x4, 0x10000, 0x4f, 0x5, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) socketpair(0x4, 0x805, 0x0, &(0x7f0000000000)) 11:04:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 0: socketpair(0xf, 0x3, 0xdd, &(0x7f0000000040)) 11:04:04 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000003980)={r2}) 11:04:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x9502, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 2: socketpair(0x2, 0x6, 0xeb00, &(0x7f0000000000)) 11:04:04 executing program 0: socketpair(0xf, 0x3, 0xde, &(0x7f0000000040)) 11:04:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7400, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000003980)={r2}) 11:04:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb501, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:04 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair(0x26, 0xa, 0xfffffc00, &(0x7f00000000c0)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r0, 0xd, 0x0, 0x8001, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) 11:04:04 executing program 2: socketpair(0x2, 0x6, 0xeb01, &(0x7f0000000000)) 11:04:04 executing program 0: socketpair(0xf, 0x3, 0xdf, &(0x7f0000000040)) 11:04:05 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x7, 0x0) 11:04:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb903, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7901, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 5: socketpair(0x28, 0xa, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0}) 11:04:05 executing program 2: socketpair(0x2, 0x6, 0xec00, &(0x7f0000000000)) 11:04:05 executing program 0: socketpair(0xf, 0x3, 0xe0, &(0x7f0000000040)) 11:04:05 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 11:04:05 executing program 5: socketpair(0x26, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000040)="d7a6246443b74760ab9ddc878938928c2d755320e2fc399ce9471689e4ab3999bff772630dbfbe0175a8644e8f1ecabebd5dc963a101730ee4900be87673f37f4dcf975e896a07ba963695ae8960e956f06965c06b02552a836af1a720cdd74ee29e1437cfdcb49ecc4a0f", 0x6b}, {&(0x7f00000000c0)="85d8bc8de0e5a9a41e888ec8efe6e567d18dec534852e72d584aa6c70574b041df152b059473e0e81f8990c9215114dd487d", 0x32}, {&(0x7f0000000100)="09dbb891dd1b33f3fe47b65a7d7a67ad87d3a6b4fb5074846224082e5714469095759dc6", 0x24}, {&(0x7f0000000140)="c5a5f7a75125110def6289056067574ef9decf98049176ad6913e380345cdd4da74895f148b6dbd78e16381adaeac7718a724634f0c5fcb80601cba434a1a78cefb3c285bc710cf7387d2d5f4296db0b9ce6f7f4cde46207310974c50ed04558513127b5126edf9373caf375666b0bf2fbcbfc5bcdde71741bca09e32457fcf276381151523e01dc1c4580450e0e951113f78601be02f4dedd4118eb4015d5f7cf23a64f6c79528cd6b4599310b08b0256a705756dedf7f3af82595e7691b17fbea0e74427fe2a7fbdd631365e6ec0119eb44fd77054c8a43ad9b7", 0xdb}, {&(0x7f0000000240)="c1c4a5a6dd28c29caf1c997b688847", 0xf}, {&(0x7f0000000280)="df5de5afc1", 0x5}, {&(0x7f00000002c0)="79213d21cf136ff4c0216ef27f0c14b84f582f151ffec391442d80fdc995361beb1c21901f15e4980753eeb7d39fca3487db2f76aa5e3ab3e589581beac4ff14708abfeb89672535170310f5f7ac966bac9cfe6d89a75b7d9c092d9d4d9afcd7436df5f9d7be52f6fdc544290f4dabcf65b8011c8c91693b33523bf47527824802e5328022860de719f7060b3018871b4ad45a2d9b1f4120d69017b5bc2ae5264160fcc7a6baab72989d30188deb7747ffbf3d5287295ceb81b4cfdfe92b70c5efe37418958559f051e5c6cf332a4ac1565183cc6d5b22bc683414dbc374cec2dd47", 0xe2}, {&(0x7f00000003c0)="f4a456c02815382d60bd2d64a6db0c657c7ab36bc674b476a43bc45368571d261343d2b92f8f6b887edc20c823c55caa5edc5edba5883f7f6b5f5c0b3685875fc6c6c906f56e5f13f49acb8fcc05411aafdf06ea1b3037340305ef3d6393c153c6922db12c3fb399652bac9b433174e7d9dbaa973c0c3e4c0cf32600213ac572bf83202394b17ec35ea7eb39cd7356612f0c4bd4cc5e48bb86fa15e2483936786adf1183c84484aa50fe105e3bff0d6beaf79859602bf6d02dd08e1c15798ece43ac31d49915d426c9211da46ebf3f5d81c547588f91fdfdeff3a85173844c22cd82ae1da96ae14dc9bee48fe259db83", 0xf0}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="0b3e6d0db9c12bfbe173e3d82920ce6e8668a0b3f1a7ed5ba69b81ad229576beaefc16f0f5eb63061600234bf6c5c45d2d780079cb44220e21c8dfd48f2dfde4c236bc2b236d441f46910d4f850a5638e65b6795d04f9e686749354f", 0x5c}], 0xa, &(0x7f0000001600)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x18}, 0x40000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000016c0)={&(0x7f0000001680)='./file0\x00'}, 0x10) 11:04:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd03, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 2: socketpair(0x2, 0x6, 0xec01, &(0x7f0000000000)) 11:04:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 0: socketpair(0xf, 0x3, 0xe1, &(0x7f0000000040)) 11:04:05 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r0, &(0x7f0000000140)="9954a6ecf5fe9c1afe555dd3277e2273f78f6a6326871450080731c27d552b8e88f2990ada31adb5c2c396822e7c74c810b2ec18da68ba956cceec20c5e99f9872a6d72636e2ee6a355e7ea96d1ba2460814236eddf26daa0509ca25b1d324b8a1c2d69eef599a2ffc1f1e8b444c70d8efc52469a2d418d68fc6e70df2b04c3a8046f53028b4fb373e406a849b101b6cba83ad6912c6fd97fd93f5fd09c9217d2722b2b23bb5ba4201cb07cbe7934362b98bfb46c30f29859c9edfccadadd588370b3378aaa955a5f43c762c3b8989ac8d446751b3729c29c8988ce7c0e1edb112b501db001498bd22ef37a3ce1d", &(0x7f0000000240)=""/69}, 0x20) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 11:04:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001380)) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f00000001c0)=@ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000240)="b1c9aca79bda6e30bd9d16eec50055c7a71b6c8f56738daad94b80c66a68891c3fb072fa64581d82470a8eb113c7e46f0f138eca33f87d0ffeda8c7b780ec00a2dc8c017cc10", 0x46}, {&(0x7f00000002c0)="9ef83c2e5e39dc2955c0a7f67fd17a4820c21bcaab408cf29d97fc39e182190e8c3ac4a11b8751f27f4e4713fd1fbeabf1c178548d1970b0ee44d6f78a437c6dcc4153af04c72e711048b5412ef7b0959b54c4a4b1de668adf5c9cedaaf9b6f3e5e9e4b97e67587319549c5143a1d9c2aa3b5b06f3ea0fd101f714f69fdad4f0d9a021ff73", 0x85}, {&(0x7f0000000380)="01f3aeec47d6fdfa955117939211a4bd4cbd090376499ebf7aa802d349b2da331cad76c79061c86140a92e7512fa19589b6594ad94347de344bea154ce46728b3e1b0973f8d0b908960e2ff7dd94c56b553a4844d32efc3e4d8bbd75", 0x5c}, {&(0x7f0000000400)="15042ec7837b0d4d479d67e94aeb48c63d97201bd7dfc113d6a05d5fb620bf88ea267cff427d04e5d40eff25cde4262d82abe07c825d2463a225a298926398fbde010523189045e987fa5bbdcb78b6d7012877d33f70beca0b277eee80a42d0004c1524d0fa7e38c868751915b10a773a422794d15630a1b05da8203f1ccf0b90deb6efc4d0f8c656ac9a25f07be410422e61b86d586d134e632", 0x9a}, {&(0x7f00000004c0)="03a095124d1cb83d66d8e3fcf85325a9fb5402afc070cc8b9dcf72fdf8a8956af123c8a9de667e145dabf0f55f1d7026fa032335409c424b3e7687266200ba58326878c4293c0196040b874d3c0a20cec9d95a3d8778c3fb793a20156f94fc12fd3ccb600f78b4e00f7dc4afa0e75f0e69e28102840d7fb2a89b5df702915491990d5a2bf23d24eeb69174b8565ec3901666705296cd18dab1adc182eafdc52522accd48ee3a36ef0f08fdaf23eb0d011b7fd8ab50fb6a7b36138df415ac6f85afe7c6ea8ff2abccbd7fbda498a2f7fd41af", 0xd2}, {&(0x7f00000005c0)="d81e5e1e42692b7ec480f095ecd0c965c970cce7de523cc8f64dae3159e356a5e8a7ddcf299bf2a58d447a8f0f3383712d2e83f4447d25a8aa7d83eb7350835623144380e246af3d4c032a7029c513f876b1fb824d650e51bd4c464858aea7067a54290e149ed6df44d6ef8d53773c8addee86ed18393161bd06ae42423a79bb3e33a070d9fc61ee5d0993e1a4365b3135640ad17734b66786278e24a1f9171e187c2b2aad3d3f57a2baa9c044159daffbd5101371fd9da03007678bb365f69087eab82233", 0xc5}, {&(0x7f00000006c0)="f7b392d688f2ae6d9f4110aa6ab657911af5a3b9e8172383367f0a1d0b464a3ae060ad31b695dcda177ee689835a2a5bfff75ace76255d0babca8b8dd1565d02f75917bcc9998145c51b9b620416782ba3916516c36e7caae24ccdf14b8178de6189b0472c37e45cc8013823b9b0964d6359bc3166115c", 0x77}], 0x7, &(0x7f00000007c0)=[{0xc8, 0x10d, 0x2, "ec7812d5a433bc260d68cd01cfa813d2e4cee78c458c15059e523f9054ae193601669a1502c863b5747f68793e4c943192765d5710b3745721ff6b5a578f0a4ed8558796747b9a7954d5f5b4130705e7e354f6cbfdc001da44742d5efcf119b2ec4bd87e9d2cdad61ba39c5cc8c8b5ace379563af14714879b975f9e5a893ad004788f33921defc4a981b1c397c67c6b30c67926319bbb4acb7f25eb8d2df2e08448269c37178e88e2bbe6329aefca8fb3"}, {0x40, 0xb, 0x9, "a1179b2f99801c0289acbcc5876f7e2c1b2f4f5d9fcc4923860076f1c8b311e40c5cb6e1d25bd6eefa"}, {0x58, 0x10b, 0x7fff, "374bb0adc543bce808a4f850a14fa7112a1e0064e8479a936cd10cb53eeaf40252fe9039e79182bf3e00a3ae33b1fc1273f358da1b36de02e07219570b82bde0978c5166"}, {0xa0, 0x10b, 0x6, "8694a7b8d446a716d8da7b7e9f5babaaabb7fc7cbf041341b83e782fadf64c6d7df9434e3f52c6eaab43397161935152d2c63bee75f282e132b85509232004332877342cc0cdf91ca409cc7c0a7d34cd66328ec9c10a6f0fcd2ba721a18cf7ae8b3c6d327f81e6ac131c5194da9c673f1863423bc5211388ed43af0ea5516815bf69de987e841a8ec3171c"}, {0xa8, 0x1, 0x4, "ba01a46f575ef770da89cf906e4a36007b181b6b95829b29078f9335ebf0671c393585c499945ac5fbb39f5faccdbba6da08c53a17b77fc9555c4c19329ffb745d66dfa0b250366b8efb03059065561509648b23e7d6016e1f5816fdca04be74d0b97cbf8e4a0daafeb3d384f503513de7b4884f7aea41b5c1112df924d6670979ea3e41fa8b67f6b13150de67de09e58c05"}, {0x110, 0x88, 0x1ff, "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"}, {0xc8, 0x88, 0x4, "0b31477fa56d8657bbbdb6c11e7a379392e37e6734b3c3cc1592d32879086b4efe670dfea98e55a39cd241002a272df7007d3dbe60447d6be6b1f777c18f02c182c206d5efb2db56036d978a26d69e30d23104eecaa6e1ae4f6143b194a6ac14b38c2fb3d19100b04729fac67ee47af29ef129b8f74b3e6e6fa4524bc4120d651bb6988cf6d87e38969cd27ac29af24fa34b8fbd2aedff39f4368c5a14249ccf987bf5a5764820ad3750915ad0730f4cff538077"}, {0xd8, 0x107, 0x5, "07a057dc6b6fc7ed08da04f531ebebd67221c29d5f0b26d8c1bd2cef9ef83f73bf846599d13f27e676e78e06c8648828d7e838eea329ebdf1fb73431d1603622e538261838a2b6b8867b78a758416f782a3ad36447454aa92bfa28743a76506887e19246b7025d380400b4c91a22a2644a200f1094062380f55e1c861183fab68e24a832ce1b263e4e63f7ec94e243d2ec00560554ff67ee947dd6e688304fa012762c7b85202446554f8bba2270787d8f2c962ca01550a0e72bdc6f79a675d6894c85b199"}, {0x30, 0x10e, 0x6, "d89d83fe73ab07190d8925e575806fa791d8d201bf50fbb0634ade9b7312"}], 0x588}, 0x4084) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@llc, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/56, 0x38}, 0x10040) 11:04:05 executing program 2: socketpair(0x2, 0x6, 0xed00, &(0x7f0000000000)) 11:04:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8100, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 0: socketpair(0xf, 0x3, 0xe2, &(0x7f0000000040)) 11:04:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80d9}, 0xc) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 11:04:05 executing program 5: socketpair(0x11, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f00000003c0)=@l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000440)="913f53084b4aa0f02c131cdd2b9cd8e1fe7708f5143e7437c97c6b4658c3e2e9828a89f6d565b5c4085fa9c8d4b155598d99933607e4b1e8b535857a08cc43c3b451aa7fcc1b49b5b34a1d8bf2213d420518ff75c392e60fdad20825398858e3af35495a5b79e3d0a498e86fc57402f80e3269c6eb10ad40f2d7e8c735fc818500c405db9e28aa4eca9a05610a0fa1", 0x8f}, {&(0x7f0000000500)="c775bc98dd96380599070122fee9bce420f0259a04b1894f723a741aad4f4658bcee268826d260f8e19e54614e9d2313d7af9751102948cba4f578f32c961a171f30e45743c4b4b508b5a551e144bcde07ace4282bff9b385f9d0edc", 0x5c}, {&(0x7f0000000580)="ed0eb141f2fcd4f343ae6e132d2bf0d8ee47037823ab698444378f2bc126d747250cfb5a64878d12339840b84bcb4f29533e934eab142fb8cc3b6bb1f33d2c4960e1fb5d3a70845eb3436a6093c4dbc2486bf781ae1f783e4fe16fa0c7ea73cbbd4974a847a40df034eff5da505aaea9a450d27a346e5aa01c369a1d3735704be26d4f04f9a981bb407dfccbdf8ddc07e0a07c39ace06bdeded9eca57088fc4747a17cfb68fdd4b4215b563e15f3d431a90821ba15b92923e697ca1d755809f843dc528eab94719ecf9facc61cc157d67afd16990a42f9ba7363c3fd37fdc881efa26a52c29bb4cf8c4fa313e798", 0xee}, {&(0x7f0000000680)="a1e9f25452f9fbc3ca97d14b3bda6556fe4cb02dc3e5f4ffc6f11a0f8288d2b19811b7ee0d9e6605dded4c37d3b09af159f8fe50ca90e29d4db1154c06b4aaf358cacd65740fb8a3aac1b8de2f0cd3d7c4bab63439c3697165973d96505268f9e284fd80c9685431535eb85267fafefb9cb95072cba25f4220deec20577cb31fc695bf4937d0210c111b91b3325926b2996411ee6c38d70b628e5e0020b8fbd4d843b4b9beb2e1640852ae20391a769a17a861ea9595a16459e2b8e9343d4ef2c66e97441db01ed2ad4e777c57f8ec301ecbb4a02594fc2c0cd0537558083f419d37cc717b380987", 0xe8}], 0x4}, 0x8000) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x3c000000, 0x18}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000080)="bbd2634aa63ac65699acea25bf1e2f0708f8ca297b89c43a80a5d74f5d3870679e37d30570dc7490416391f7fdac1867333806a99e309eeb9ce5135c1a19da0fd16e1372c1cfbe9eec0203de3b8c7ac146dd771fc9d42a6657c150dd0be332c74eab594458214b8cad", &(0x7f0000000100)=""/22}, 0x20) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000002140)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac00000007000000100000000000000e03000000010000000f000000000000070000000006000000070000060400000002000000910600000000000004000000050000007cb90000000000000400000004000000030000000d000000ffffffffcb233c35adaa77420c00000000000007000000000b000000000000010000000050002a00050000000000000c030000000a3fde000000000c02000000070000000000000a030000000f0000000000000203000000005f2e5f305f00"], &(0x7f0000002240)=""/149, 0xcb, 0x95}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x1, &(0x7f0000001b80)=@raw=[@ldst={0x1, 0x1, 0x6, 0x1, 0x4, 0xffffffffffffffc0}], &(0x7f0000001bc0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000002340)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000002380)={0x5, 0xb, 0x4, 0x8}, 0x10}, 0x78) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='cpuacct.stat\x00', 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x8, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x49}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f0000000940)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x24, r3, 0x8, &(0x7f0000000980)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x3, 0x10, 0x54bd, 0x6}, 0x10, 0xffffffffffffffff, r3}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000a80)={@map=r3, r4, 0x8}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001b40)={r3, &(0x7f0000000b00)="c75ec9e18f9fbf9adec16d97", &(0x7f0000000b40)=""/4096, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000008c0)={0xffffffffffffffff, &(0x7f0000000800)="e221ccca233c22102a29c5c15850139923eceada83a9e2e133d5fcc80f74747f233f4077ab2377fa55bdab029f668be44240e845ff15ddfcdb50e796d24ca012f89e", &(0x7f0000000880)=""/27}, 0x20) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)="4aa4a64483fe1e6fa4cda3cd8acac270fab6360f148e1ca6e9f820991f4504499bbaf5648d927c00a646", 0x2a}], 0x1, &(0x7f0000000280)=[@txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffd}}, @mark={{0x14, 0x1, 0x24, 0xad}}, @mark={{0x14, 0x1, 0x24, 0xfffffffc}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0xd8}, 0x20008000) 11:04:05 executing program 2: socketpair(0x2, 0x6, 0xed01, &(0x7f0000000000)) 11:04:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8500, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 0: socketpair(0xf, 0x3, 0xe3, &(0x7f0000000040)) 11:04:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0ff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:05 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800, 0x8}, 0xc) socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 11:04:06 executing program 2: socketpair(0x2, 0x6, 0xee00, &(0x7f0000000000)) 11:04:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8510, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 5: socketpair(0x17, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x1) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000180)=""/33, 0x21}, {&(0x7f00000001c0)}], 0x4, &(0x7f0000000240)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000340)={'bridge_slave_1\x00'}) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) 11:04:06 executing program 0: socketpair(0xf, 0x3, 0xe4, &(0x7f0000000040)) 11:04:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf903, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 4: socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 11:04:06 executing program 2: socketpair(0x2, 0x6, 0xee01, &(0x7f0000000000)) 11:04:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8520, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 0: socketpair(0xf, 0x3, 0xe5, &(0x7f0000000040)) 11:04:06 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 11:04:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 2: socketpair(0x2, 0x6, 0xef00, &(0x7f0000000000)) 11:04:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x9003, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 5: socketpair(0xaa8a1f44e9b0a1ae, 0x3, 0x8, &(0x7f0000000040)) 11:04:06 executing program 0: socketpair(0xf, 0x3, 0xe6, &(0x7f0000000040)) 11:04:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xff00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 11:04:06 executing program 2: socketpair(0x2, 0x6, 0xef01, &(0x7f0000000000)) 11:04:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x9502, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 5: socketpair(0xa, 0x3, 0xfffffffe, &(0x7f0000000000)) 11:04:06 executing program 0: socketpair(0xf, 0x3, 0xe7, &(0x7f0000000040)) 11:04:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1a23fe, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 2: socketpair(0x2, 0x6, 0xf000, &(0x7f0000000000)) 11:04:06 executing program 0: socketpair(0xf, 0x3, 0xe8, &(0x7f0000000040)) 11:04:06 executing program 4: socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)) 11:04:06 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/81, 0x51}, {&(0x7f00000000c0)=""/197, 0xc5}, {&(0x7f00000005c0)=""/2, 0x2}, {&(0x7f0000000200)=""/148, 0x94}, {&(0x7f00000002c0)=""/33, 0x21}, {&(0x7f0000000300)=""/116, 0x74}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000600)=""/80, 0x50}], 0x8, &(0x7f0000000500)=""/108, 0x6c}, 0x0) 11:04:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x200000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb501, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 4: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 11:04:07 executing program 2: socketpair(0x2, 0x6, 0xf001, &(0x7f0000000000)) 11:04:07 executing program 0: socketpair(0xf, 0x3, 0xe9, &(0x7f0000000040)) 11:04:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0ffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_ext={0x1c, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000c3ff7cffff001000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000000c0)='GPL\x00', 0xffffffbe, 0x46, &(0x7f0000000100)=""/70, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x7, 0xb6d, 0x3}, 0x10, 0x2}, 0x78) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r0, r1, 0x3}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={r0, r2, 0xc}, 0x10) 11:04:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb903, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 4: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 11:04:07 executing program 2: socketpair(0x2, 0x6, 0xf100, &(0x7f0000000000)) 11:04:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 0: socketpair(0xf, 0x3, 0xea, &(0x7f0000000040)) 11:04:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd03, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x30a00, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'gretap0\x00'}) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) socketpair(0x11, 0x80000, 0x0, &(0x7f0000000000)) 11:04:07 executing program 4: socketpair(0x22, 0x0, 0x0, &(0x7f0000000000)) 11:04:07 executing program 2: socketpair(0x2, 0x6, 0xf101, &(0x7f0000000000)) 11:04:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 0: socketpair(0xf, 0x3, 0xeb, &(0x7f0000000040)) 11:04:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 4: socketpair(0x22, 0x3, 0x0, 0x0) 11:04:07 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0x1, &(0x7f0000000080)="5cddb701f74e9e1fb23ffd52964c5b0be55cbd06d63308eb94b4464e5449e2522c07e821c585a2f6e4a40c7e36dd1745a9e1b9febdebe194bbab74db0c5b022ccb85444a0d", &(0x7f0000000100)=""/191}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:07 executing program 2: socketpair(0x2, 0x6, 0xf200, &(0x7f0000000000)) 11:04:07 executing program 0: socketpair(0xf, 0x3, 0xec, &(0x7f0000000040)) 11:04:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map, 0xffffffffffffffff, 0x4}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x242101, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) socketpair(0x23, 0x2, 0x1000000, &(0x7f0000000000)) socketpair(0x4, 0x5, 0x6, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 11:04:07 executing program 0: socketpair(0xf, 0x3, 0xed, &(0x7f0000000040)) 11:04:07 executing program 4: socketpair(0x22, 0x3, 0x0, 0x0) 11:04:07 executing program 2: socketpair(0x2, 0x6, 0xf201, &(0x7f0000000000)) 11:04:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0ff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 4: socketpair(0x22, 0x3, 0x0, 0x0) 11:04:08 executing program 0: socketpair(0xf, 0x3, 0xee, &(0x7f0000000040)) 11:04:08 executing program 2: socketpair(0x2, 0x6, 0xf300, &(0x7f0000000000)) 11:04:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000000000005f00b52c5b51186a2781bf995e04f09a3ea5c5d8522d4b55747844dcb3f358d0a024c79bdf4fca27dc4270bcd9cae22e44e4e58a88c2074c0aff6dee8a9b58bf21d40cda6e363ec6cc76a63ba2764a50afe559d1704f701f1607bb7987bec7092bf6fa2baf2271abec8ca1c6a8ded2a13e9dcf3d29ed7aa35990895444a634f1a372ed779d837d1ccc0259a9324d5a52"], &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r0, 0x10, &(0x7f00000009c0)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r1, 0x4) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x40000) recvmsg(r2, &(0x7f0000000380)={&(0x7f0000000040)=@rc={0x1f, @none}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/163, 0xa3}, {&(0x7f0000000180)=""/39, 0x27}, {&(0x7f00000001c0)=""/131, 0x83}], 0x3, &(0x7f00000002c0)=""/153, 0x99}, 0x1) 11:04:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf903, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x9003, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 0: socketpair(0xf, 0x3, 0xef, &(0x7f0000000040)) 11:04:08 executing program 2: socketpair(0x2, 0x6, 0xf301, &(0x7f0000000000)) 11:04:08 executing program 4: socketpair(0x17, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) mkdir(&(0x7f0000000080)='./file0\x00', 0x1) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000180)=""/33, 0x21}, {&(0x7f00000001c0)}], 0x4, &(0x7f0000000240)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000340)={'bridge_slave_1\x00'}) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) 11:04:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 5: socketpair(0x3, 0x3, 0x8e, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)="bba8a4428297a70de38b93c0de7617a90cfcea135283815117bacd34dff58e4bfa8a0e9654ae89d5ed8fcc17b9bde35c65e6996e4b427a", 0x37}, {&(0x7f0000000100)="0a0b5865b1662d791b15cdc6c06414f96c06ba02a5f5450f9a3eb06cfa17d68e791757157481f08e138f1df2d7705d8576f326561900091f2c63947a6bb5aef42c48277c88076b7e8c29d763c0ff056a7e29afd37d211e81a753256b34018245562e8a81a5b8baccbe5f79854bd5a84f1dbacf7e5dea0d8f9ac206c8a9725d0119", 0x81}, {&(0x7f00000001c0)="276e24ded4abd82ce398d9fe9092708395f9d73a2666ae63d86376740e3f812cadf080fd7d6708b872f2ea9f55e10afe6b0443b40c10a3f35865ba766bac51942fc90aff2cc8879b39cf59d6d2c09b7f758fc479565047e56ba190a3669befbd083afc822c25f2a41b7b399c53795fcc6ba2bb7db23db19334cc3a45738814685258fdcedee17677d24a5b0798e7bbbbdbd2b1051b8afa1b84e3b12c200d06a1cda7ff30880db067f71ad2852ff570c2caa1dd42a67eb79fb270ce62761031cb1cf252376b81d80dbe4769a14dfce94b4324e6ba48b40519d47cd8cf4cad6e", 0xdf}, {&(0x7f00000002c0)="a9e089f35e25d823", 0x8}], 0x4, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) 11:04:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 0: socketpair(0xf, 0x3, 0xf0, &(0x7f0000000040)) 11:04:08 executing program 2: socketpair(0x2, 0x6, 0xf400, &(0x7f0000000000)) 11:04:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xff00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8500, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 5: socketpair(0x1a, 0x80000, 0x0, &(0x7f0000000000)) 11:04:08 executing program 0: socketpair(0xf, 0x3, 0xf1, &(0x7f0000000040)) 11:04:08 executing program 2: socketpair(0x2, 0x6, 0xf401, &(0x7f0000000000)) 11:04:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd03, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1a23fe, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x40000) sendmsg(r0, &(0x7f0000001300)={&(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x0, {{0x41}, 0x3}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="ff28f045c2ed5a86f170604fb32d98291bb1798062d0f351f773eaa4e2ef5bcece1277c0cfd8f153d5e8b9be57ae6d596819730296d5fbf3565e73727ae2025a6747afefefe7a5c4ba90a998b1e5773dc873c964b3cd59b4634df5be71cdec494a55a1800984e8ec54efa7d02dda3bbea14b806c691d639dbd6e1e70181fce3dbc", 0x81}, {&(0x7f0000000180)="03405f738c18d9356b4de6d4e3276e78bf3e27b400aa4fc7140a3e578d4ddf035f9b5746b344e2ae542b0659c16dd434192cdec27706d86656576840b08f3b7852be831e84ad871b8e9f5077877cc0a5b3e0da93ddace27157c326bd73aa0fe6105892b151b9e9401e7602e622ef69e5a52d5ed92846a5b8e513b0542d05b1a657044430568566c9cd609dd06df1f8cfea5b2b9f75404b0a007c8b0d7e4cc1ef6de5ab2214cea6777faa4a6ac7dd59adbfbccb090be7b95f4eda3ab01374ee53e05361", 0xc3}], 0x2, &(0x7f00000002c0)=[{0x1010, 0x112, 0x100, "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"}, {0x20, 0x103, 0x0, "cc5953999038c5272e55066b2aec"}], 0x1030}, 0x8000) 11:04:08 executing program 2: socketpair(0x2, 0x6, 0xf500, &(0x7f0000000000)) 11:04:08 executing program 0: socketpair(0xf, 0x3, 0xf2, &(0x7f0000000040)) 11:04:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xa000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:08 executing program 4: socketpair(0xf, 0x3, 0xf1, &(0x7f0000000040)) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x200000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf501, &(0x7f0000000000)) 11:04:09 executing program 0: socketpair(0xf, 0x3, 0xf3, &(0x7f0000000040)) 11:04:09 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)=':\x00'}, 0x30) 11:04:09 executing program 4: socketpair(0xf, 0x3, 0xa0, &(0x7f0000000040)) 11:04:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x18400000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf0ffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf600, &(0x7f0000000000)) 11:04:09 executing program 0: socketpair(0xf, 0x3, 0xf4, &(0x7f0000000040)) 11:04:09 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x6, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r0, 0x4) 11:04:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1f000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf601, &(0x7f0000000000)) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x4, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 0: socketpair(0xf, 0x3, 0xf5, &(0x7f0000000040)) 11:04:09 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000005080)={&(0x7f0000004e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e80)=""/24, 0x18}, {&(0x7f0000004ec0)=""/151, 0x97}], 0x2, &(0x7f0000004fc0)=""/139, 0x8b}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000005140)={0x19, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcc34, 0x0, 0x0, 0x0, 0x5}, [@exit, @alu={0xc, 0x1, 0x4, 0xb, 0x7, 0x50, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x54}, @alu={0x3, 0x0, 0x1, 0x5, 0xa, 0x2, 0x1}, @generic={0xe, 0x0, 0x4, 0x948}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf67, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x8, '\x00', r0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000050c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000005100)={0x2, 0x1, 0x6, 0xffffffff}, 0x10}, 0x78) socketpair(0x1f, 0x800, 0x0, &(0x7f0000000000)) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf700, &(0x7f0000000000)) 11:04:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2d030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x80000000}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x9, 0x6a, &(0x7f00000000c0)=""/106, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0x8, 0x400, 0x401}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r0, 0x2, 0x2}, 0x14) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000280)=@raw=[@ldst={0x1, 0x0, 0x2, 0xd, 0xb, 0xffffffffffffffc0}, @ldst={0x1, 0x1, 0x1, 0x3, 0x7, 0x80, 0x10}, @jmp={0x5, 0x1, 0x9, 0x8, 0x8, 0xfffffffffffffffe, 0x4}, @jmp={0x5, 0x0, 0x7, 0x0, 0x9, 0xffffffffffffffc0, 0xffffffffffffffff}, @exit], &(0x7f00000002c0)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0xc, 0x1, 0x6}, 0x10, 0x2b6ed, r0}, 0x78) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000400)={r1, r2, 0x7}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf701, &(0x7f0000000000)) 11:04:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x401}, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0xff, 0x4, 0x1, 0xfd, 0x0, 0x1, 0x2051, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000100), 0x1}, 0x0, 0x1, 0x57, 0x0, 0x3, 0x9, 0x5b, 0x0, 0x2, 0x0, 0x8}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)={0x0, 0x6, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}, @random="3847c59a5a8e", @multicast, @empty, @local, @broadcast]}) socketpair(0x27, 0x7, 0x0, &(0x7f0000000000)) 11:04:09 executing program 0: socketpair(0xf, 0x3, 0xf6, &(0x7f0000000040)) 11:04:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x48000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x5, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf800, &(0x7f0000000000)) 11:04:09 executing program 5: socketpair(0x21, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg$unix(r0, 0x0, 0x40000) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000040)=@phonet, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/79, 0x4f}, {&(0x7f0000000140)=""/178, 0xb2}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/79, 0x4f}, {&(0x7f00000002c0)=""/143, 0x8f}], 0x5, &(0x7f0000000400)=""/112, 0x70}, 0x0) 11:04:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:09 executing program 0: socketpair(0xf, 0x3, 0xf7, &(0x7f0000000040)) 11:04:09 executing program 2: socketpair(0x2, 0x6, 0xf801, &(0x7f0000000000)) 11:04:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x3000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 0: socketpair(0xf, 0x3, 0xf8, &(0x7f0000000040)) 11:04:10 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000440)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000300)=""/128, 0x80}], 0x3, &(0x7f00000003c0)=""/97, 0x61}, 0x0) recvmsg$kcm(r0, &(0x7f0000002000)={&(0x7f0000001bc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001c40)=""/18, 0x12}, {&(0x7f0000001c80)=""/154, 0x9a}, {&(0x7f0000001d40)=""/97, 0x61}, {&(0x7f0000001dc0)=""/214, 0xd6}], 0x4, &(0x7f0000001f00)=""/207, 0xcf}, 0x40000040) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000018c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001900)={r0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000020c0)=@bpf_ext={0x1c, 0x12, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x1}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0xc, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x42}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @alu={0xf55b19063d5fc4a2, 0x0, 0xd, 0x9, 0xb, 0x8, 0x8}, @map={0x18, 0x2, 0x1, 0x0, 0x1}, @jmp={0x5, 0x0, 0x6, 0x9, 0x2, 0xfffffffffffffff4, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}]}, &(0x7f0000000540)='syzkaller\x00', 0xc5a, 0xf5, &(0x7f0000000580)=""/245, 0x40f00, 0x11, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002040)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000002080)={0x1, 0xc, 0x10}, 0x10, 0x14729}, 0x78) 11:04:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x51030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 2: socketpair(0x2, 0x6, 0xf900, &(0x7f0000000000)) 11:04:10 executing program 0: socketpair(0xf, 0x3, 0xf9, &(0x7f0000000040)) 11:04:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 2: socketpair(0x2, 0x6, 0xf901, &(0x7f0000000000)) 11:04:10 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x91, 0x80, 0x40, 0x8, 0x0, 0x80000001, 0x4082, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x18808, 0xf19, 0xffff2896, 0x9, 0x5, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x7}) 11:04:10 executing program 0: socketpair(0xf, 0x3, 0xfa, &(0x7f0000000040)) 11:04:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5d000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:10 executing program 2: socketpair(0x2, 0x6, 0xfa00, &(0x7f0000000000)) 11:04:10 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x91, 0x80, 0x40, 0x8, 0x0, 0x80000001, 0x4082, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x18808, 0xf19, 0xffff2896, 0x9, 0x5, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x7}) 11:04:11 executing program 0: socketpair(0xf, 0x3, 0xfb, &(0x7f0000000040)) 11:04:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x68000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 2: socketpair(0x2, 0x6, 0xfa01, &(0x7f0000000000)) 11:04:11 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x91, 0x80, 0x40, 0x8, 0x0, 0x80000001, 0x4082, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x18808, 0xf19, 0xffff2896, 0x9, 0x5, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x7}) 11:04:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x8000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f00000005c0)=""/254, 0xfe}}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x800, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000700)={'team_slave_0\x00', @broadcast}) socketpair(0x29, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800), 0x200000, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000840)=0x7fffffff) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB="0c16"], &(0x7f0000000080)='GPL\x00', 0x800, 0xeb, &(0x7f00000000c0)=""/235, 0x41000, 0x1, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xd, 0x8, 0x800}, 0x10, 0x2cbbe}, 0x78) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="d99a0001ffffffff180000005da92f5c0000000001000000370855c20651b5fdcff14830cfc50a316335d3e69fbca06bc7c0c547424e9abd1d8032c2e829d9ce783bec6b56edb84d7b919eff34391e9e461abfcc96099960f415e22d0fd482932202b548cf982e7b19e85d760437bb15e5f2251aaa18258a4a05c57c48d0c471f728858d7f7cbc1a8df7fa16e731b6a302333c1a0000008000000000a18f"], &(0x7f0000000340)='GPL\x00', 0x80, 0x10, &(0x7f0000000380)=""/16, 0x40f00, 0x9, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x3, 0x0, 0x401}, 0x10, 0x0, r3}, 0x78) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={0xffffffffffffffff, &(0x7f0000000740)="a7b799dcea84b35d3f7d5edbc269dbc01eb8da10b08be5b65517946ce3e7580a3ad82cd75eea59585252430db3c88c2803c4a0c3bea41d7209181645e496dc2492d4fef325ee7c1f3f8bc3a5"}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@cgroup, r4, 0x25}, 0x10) 11:04:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xa000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) 11:04:11 executing program 2: socketpair(0x2, 0x6, 0xfb00, &(0x7f0000000000)) 11:04:11 executing program 0: socketpair(0xf, 0x3, 0xfc, &(0x7f0000000040)) 11:04:11 executing program 5: socketpair(0x22, 0x64393f7f16fed9b3, 0x0, &(0x7f0000000040)) 11:04:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x18400000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 5: socketpair(0x3, 0x800, 0x5, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={0x1, &(0x7f00000002c0)="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"}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r0, &(0x7f00000001c0)="d516a6b46f40a60e37548b1fdeb7ec7a0f4a7ea5906201e4592e82492a3fc25195f233957f6a95e7cd9131a272f4870ef122bc2d3c7204b39d42c30ae1bc0960f4b3c5ed8dcf", &(0x7f0000000240)=""/3, 0x4}, 0x20) 11:04:11 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 11:04:11 executing program 0: socketpair(0xf, 0x3, 0xfd, &(0x7f0000000040)) 11:04:11 executing program 2: socketpair(0x2, 0x6, 0xfb01, &(0x7f0000000000)) 11:04:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x1f000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000004e00)={&(0x7f00000022c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{0x0}, {0x0}], 0x2, &(0x7f0000004d40)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x12, 0x24, 0x0, 0x27c, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x12, 0x4, 0x8, 0x7, 0x3, 0x0, 0xfff, 0x0, 0x7fffffff}, r1, 0xa, 0xffffffffffffffff, 0x0) 11:04:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x74000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 0: socketpair(0xf, 0x3, 0xfe, &(0x7f0000000040)) 11:04:11 executing program 2: socketpair(0x2, 0x6, 0xfc00, &(0x7f0000000000)) 11:04:11 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) 11:04:11 executing program 5: socketpair(0x3, 0xffc180cdda8aae66, 0x40005, &(0x7f0000000040)) 11:04:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x79010000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2d030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:11 executing program 2: socketpair(0x2, 0x6, 0xfc01, &(0x7f0000000000)) 11:04:11 executing program 0: socketpair(0xf, 0x3, 0x102, &(0x7f0000000040)) 11:04:12 executing program 5: socketpair(0x5, 0x3, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="9bbf121121eff6ba4d4ac24000a0b914f092217f8c9770b853f0e6a9094fd290f21c19a99ef79e311efe3d695adc1f96acfc0dc9402d5b3454613f4390c08325677764bbd4be9125667b6d47152af8ca221b03e67d072209ee092b781940c521e509b298f0db55259117b2017a306169bf60cd189c48f8beda6d8ceb55d13a057806bac0b9de545f8999", 0x8a}, {&(0x7f0000000140)="5ce822deffe48d0148d59c7545f1f52745afbe1d0d571da591c88480b38da677d9379b3572144ef02fadb8fc7887efd60aae11b5d490c7be7d9a284ff468b73f2c43ca203e6b68e50f7ee32c4c7cfbe818d3f5ead1f485beb8ab61490e5e6cb6f8e26d3198d2aa1b133948dc82f931f35f77915d11a83e38be591a257da04b138b5a4d6527e35a482ab497534bc90cfff841fe2fd64e71ce4aefe6a3730069ce022161aa85d9c72701293d3aec0af5eafbeeaeb97527c8f78d9b5e1b9168dedfbe1181e1df0936d5d44df02c7a3c6e0c8b13ff297e4008c3ebf3c55d2be2b037771d139ef7ca8ad96fcd94f0204cd265257c24", 0xf3}, {&(0x7f0000000240)="ebd633c0fe160b71f2a6ce2d96fe7f9cf593325af19c896efd0d823e4469645ce496f1035184d1cf64274866aec4dc40431b3634", 0x34}], 0x3, &(0x7f00000002c0), 0x0, 0xc8d1}, 0x1) sendmsg(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001f00)="bd4dbd0c632ecc3303d9b1b1f086c05dc38f3b95e108f052c16fb668decab84df8e73f7f8919fae00670d0f6c9fe9f26f55b94d05c797740834c5428f161806942b5362a5e7505aed751591cbf236fc63010b17320db33af01d71b9eb3a973f58578db08790a1b3613061951a2c9cdf668505601456b2db4519a4f017045a90c14e97e563acaef0816bb90081fc31f82b0ba8eb872918704422312b366b8404c0418238fd5459bf80101cec82b250eaec659cddcb7f838", 0xb7}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="663ab0578dc2289e0a2f6076e31ed72144bcb5f5966fee4c7db177f4872685212943f7d39bc4560a2be95e2747a3fe46cf1ca0cd24f81aca", 0x38}, {&(0x7f0000001380)}], 0x4, &(0x7f0000001400)=[{0x90, 0x11, 0x0, "22acba9fa56f8b5682341e563948fbb4e93b59cb7aca37b63ff01eed9644765d34f5b596eafa3661495c3bc935c59a096cee3d9f66c66366565afc93457c5c0cee5846bf435441684d899ac764d19447aa82f00e35234306c051097f1c3af1fbbed10de4bb936fddb4a21319300aa04300390356909db1f535aa3061c6b3"}, {0x80, 0x0, 0x5, "3f4ddfe5a2ace9e448ccfe8cbc2596f0e6bf8fe3b26112155ff96d9da02a1f627f0b168faed86dad0aa0f7da577a9eaf000e1c44a6d84b5e08d165fd87c72a85cb0c73b2a93cc6963875e0881fcbae7cfb4dbd1bf66998f40d2ac02515e51af74a98031a2f74caa847f2946cdc"}], 0x110}, 0x80) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x40000) recvmsg$unix(r2, &(0x7f0000001ac0)={&(0x7f0000001800), 0x6e, &(0x7f0000001980)=[{&(0x7f0000001880)=""/26, 0x1a}, {&(0x7f00000018c0)=""/182, 0xb6}], 0x2, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x2062) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x40000) recvmsg$unix(r3, &(0x7f0000001ec0)={&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001b80)=""/92, 0x5c}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/144, 0x90}, {&(0x7f0000001cc0)=""/33, 0x21}, {&(0x7f0000001d00)=""/174, 0xae}], 0x5, &(0x7f0000001e40)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x40000041) sendmsg$unix(r1, 0x0, 0x40000) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000017c0)={@map, 0xffffffffffffffff, 0x1d}, 0x10) sendmsg$inet(r1, &(0x7f0000001780)={&(0x7f0000001380)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000001740)=[{&(0x7f0000001580)="08d32e324c88ff2c35434930c9ce74c6625e9ba6a3a1d1e4f27d492a2d37431629e81a3e25881436e5e2bd428b47a7c2ed9d5961fbc97763653995ee0d0c6c040dcf0333e8adceb7f807753d3d98a9313a20481621", 0x55}, {&(0x7f0000001600)="90e0", 0x2}, {&(0x7f0000001640)="41e904429db8f7ba680dbc8521", 0xd}, {&(0x7f0000001680)="ddb18463f22f599f47250322699bd5b4418bbfbba819a0a48029fc0451c6029661f759ef9c85c9e1e79155f2a2d7fe8a4ea206b89492d7d54f74ce4c6c3684c107904cc7d3ce2f2c774aed6daafba865752da922746dfbe149ba11248960688ae50fa2fc044e57c4fe44ce0a8864d3fe846fe8f6fb1d3585548954881387c70eaaf2016772d8b116f9c7c0dbcef29b463f6b645cac8f533f8b60cea22b19b0de1af51f095d5ddb5999d7f0861ad6a3e2", 0xb0}], 0x4}, 0x8c0) 11:04:12 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) 11:04:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x48000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 0: socketpair(0xf, 0x3, 0x103, &(0x7f0000000040)) 11:04:12 executing program 2: socketpair(0x2, 0x6, 0xfd00, &(0x7f0000000000)) 11:04:12 executing program 4: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) 11:04:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x81000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x4c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 11:04:12 executing program 0: socketpair(0xf, 0x3, 0x104, &(0x7f0000000040)) 11:04:12 executing program 2: socketpair(0x2, 0x6, 0xfd01, &(0x7f0000000000)) 11:04:12 executing program 4: socketpair(0x0, 0x5, 0x1, &(0x7f0000000000)) 11:04:12 executing program 5: sendmsg$inet(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000080)="280f04c0ea3fe0d45a29aec810d4f849dc845b9ec5bafb198884c0aaa8c7430a337ba9f47e1ec5778fed3b1bee02ec24730ff6e749ff9884d62fefb46dd616fdfb8e7eed6ff9ac830766df09e9d162e5986efdd4f599ecfa75b6bc877753740f27beda48c2df402934103c9152e5bc1b52abe04e3e76f1fc07", 0x79}, {&(0x7f0000000100)="4dd138b92b202bba49038eb8badfed56c7569d87fd3f21639b076965f9e5fea9978657be54970d84561293fa5998194fe0da2d6e845a336ba226425267a94a96ac351205b6347f36c81ad0a90c23e6f0875cf9a9e9e5106b6614dfa24b3e03c9746ab619874369c4e43b8179a4c33fdd4a145360b592dda85362dc5eb457ba52430b74997cdd0c714d857f1f28ebbd36ccf1e39770780c0b779968a87a5025b431e124eac67d062e1eb4bd33584a540fb3dcde1ac9b6c01020a7750b31d6736aeee58a962d61e42a584c68", 0xcb}, {&(0x7f0000000200)="c428468328603c8b5479168355b26f204a285c53a0423f1114be98f123df82723db408594727301b6f6356bbbf893d6e5a784323d1d6a881406f760abd15cd25584709dc32ca398fa2bebd75c16dc7e89f7325a89c57258fa1731342a9f69e052935bbded62331fd283e8c1d807bd76cc913c8899df7691fc2e9b0a918a38d109fce42fe4e53673b492e36c8a7357cc1bf476dc0ca47bf48e58a301158bd33d397500f4f1edcb92256bf2a913b5c2a02ff9863d0b1ac951c7b16a28fb065693aaad824b604c08fc1545f35f1b8be9dd4b8a04e0fcae35611045dac544c64231a7e6f98eaff36", 0xe6}, {&(0x7f0000000300)="b4c1cd4f6d09c40de57c6ba3b6a528b78deab136bcf14cc4abeffb2eb0069553d7c380c6f2db7beb3dec32fc506f414b3fb8f658afdb1ee95afc549d7dc69ab0d978940aac63421de57b4c647aa3d90fed821c324f767989487a2f4745e59f68896f", 0x62}, {&(0x7f0000000380)="45bddac51d1fd92d59b77c11b769f9c9d3a6f28945878e35c62264970c003c1eac5b8da1892feefde10b46eb1ecc47b58c13fd1cf985a4f0a34a6d005fa1a620c348dbeda07ab7797392f69332c58161156917869d0a48c887e1ac8191997652a2317d2fd6660d7373c7a7acd2bd8c94f54452df72913f3606c8871e3de4e2180fb4d0570d37bbbaf50ff81c7a059ac5e183c53f", 0x94}, {&(0x7f0000000440)="b4c9667d6a728cf69873ca7c2276fe56a3a327e4f3da4e04867ad16146ef4346f33148a257f9d0cb594882d10befc610eb13ab9e08b76395ab8e1307a15c429fefde99b1b72ecfca6cc97c4cc3d8219fd2fef0d31b3b213e64faccc8cf8e35c863f7b851d0c25a662d3163e92f95f7276325eae3772e05c675a6cacac0d6d7fef87a09e5206e628015b8ad3192940c1b68ea1dcf4edce6cacd47dbe0fc882fdfbf90ea0f96fbd1041e19516f9da6de558523e68b413fcb5b", 0xb8}, {&(0x7f0000000500)="90e5cad245f1091651b309f432484ab5dd3c2e3a626d572954bfc43a", 0xffffffffffffff38}], 0x7, &(0x7f00000008c0)=ANY=[@ANYBLOB="0c010000000000000000000007000000830733e0000002442cbc51ffffffff000000036401010200000005ac14144200001000ac1e010100000081ac1e01010000020044542641ac1414aa000000200a0101010000010100000000000000097f00000100000001ac1414bb00000002ffffffff0000001f7f00000100000007e000000100006d910000000000000007ac14141600002a5300891b3067030000ac1e000164010100e0000001ac14143d00000000442cda830000086401010100000003e000000200000009ac1414bb00000002ffffffff0000007f440c7d91ac1414bb00000400070d05a4009ea98627091d02bd8313dc7f000001ac1e0101e0000001e0000002000000000011000000000000000000000001000000ff000000000000001c000000000000000000000008000000f728f848c9525e9760892d9dcaceb45d4aa0c6b5fe3ff9d68f784d8e670d96ebf0b4c96a79a2985bfc0746b1fb60d523d9ffdaefec", @ANYRES32=0x0, @ANYBLOB="ac14149b0a01010200000000"], 0x148}, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x40000) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) recvmsg$unix(r1, &(0x7f0000000e40)={&(0x7f0000000640), 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000740)=""/84, 0x54}, {&(0x7f00000006c0)=""/29, 0x1d}, {&(0x7f00000007c0)=""/245, 0xf5}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/17, 0x11}, {&(0x7f0000000cc0)=""/103, 0x67}], 0x6, &(0x7f0000000dc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x40000140) recvmsg$unix(r2, &(0x7f0000003380)={&(0x7f0000000e80), 0x6e, &(0x7f00000032c0)=[{&(0x7f0000000f00)=""/52, 0x34}, {&(0x7f0000000f40)=""/31, 0x1f}, {&(0x7f0000000f80)=""/175, 0xaf}, {&(0x7f0000001040)=""/61, 0x3d}, {&(0x7f0000001080)=""/222, 0xde}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/187, 0xbb}, {&(0x7f0000002240)=""/48, 0x30}, {&(0x7f00000022c0)=""/4096, 0x1000}], 0x9}, 0x18121) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000a40)=[{0x70, 0xff, 0x1, "bed09652980421d7c227a6eee9364d10430189aebacc636205e60a0e2b5d60405dcfc78382ded376505775f4dc56e579a71d50e09d0d781d70bc47248fcaa65b1aef6501c98144e0dae5048f40174d0ed26927f92859f4308d"}, {0xb8, 0x108, 0x2, "a4460a35451c92dd92f2a86c90dd697620e1ca7024f33ef0ba4a21a4bc52746059270d840e1bea096b4a0967249b3394bf6c92b9a5b320100f353e4a754ccf726a778d5ba7be1f3383e500e7658af0b0d02da1f2a38bf70398bdb6edb8789985c625e9ebe3bb6c552c76d9017c1e4541cc3db9bc5984a0556b8a01e00c6693027b9962153205ee5a87bb74bfafeddf50b280bbbe233bff2f032b1d583e1d345924b53a39d7e8"}, {0x78, 0x920247d960151335, 0x1, "9db2e1bda8be53824515fa812e3729740d138f16d6872036f5618a273510db16668f5241d4222506d5f2ae53a87c9438b0c31f336a64f109512bcdf4ecbbe82cccb2adc4177f19bc28512b3ac218aa7ad515b94290a60c61f30617c5525112bd95f346df6b3b"}, {0x40, 0x108, 0x3, "f2255d42a1d9e5bdf0e0411e6da10ada040f1b1fea30213f81a24524f2a18c702f58c3c830453536491bad920ba7"}], 0x1e0}, 0x401c004) socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) 11:04:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x51030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 2: socketpair(0x2, 0x6, 0xfe00, &(0x7f0000000000)) 11:04:12 executing program 0: socketpair(0xf, 0x3, 0x105, &(0x7f0000000040)) 11:04:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x5d000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 4: socketpair(0x0, 0x5, 0x1, &(0x7f0000000000)) 11:04:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85100000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:12 executing program 5: socketpair(0x1, 0x80000, 0x0, &(0x7f0000000000)) 11:04:12 executing program 2: socketpair(0x2, 0x6, 0xfe01, &(0x7f0000000000)) 11:04:12 executing program 0: socketpair(0xf, 0x3, 0x106, &(0x7f0000000040)) 11:04:12 executing program 4: socketpair(0x0, 0x5, 0x1, &(0x7f0000000000)) 11:04:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x68000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85200000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x1e, 0x3, 0x9, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) 11:04:13 executing program 2: socketpair(0x2, 0x6, 0xff00, &(0x7f0000000000)) 11:04:13 executing program 0: socketpair(0xf, 0x3, 0x107, &(0x7f0000000040)) 11:04:13 executing program 4: socketpair(0x25, 0x0, 0x1, &(0x7f0000000000)) 11:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85ffffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 2: socketpair(0x2, 0x6, 0xff01, &(0x7f0000000000)) 11:04:13 executing program 0: socketpair(0xf, 0x3, 0x108, &(0x7f0000000040)) 11:04:13 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x1e, 0x3, 0x9, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) 11:04:13 executing program 4: socketpair(0x25, 0x0, 0x1, &(0x7f0000000000)) 11:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x90030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 2: socketpair(0x2, 0x6, 0x20000, &(0x7f0000000000)) 11:04:13 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x1e, 0x3, 0x9, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) 11:04:13 executing program 0: socketpair(0xf, 0x3, 0x109, &(0x7f0000000040)) 11:04:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x74000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 4: socketpair(0x25, 0x0, 0x1, &(0x7f0000000000)) 11:04:13 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x1e, 0x3, 0x9, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) 11:04:13 executing program 2: socketpair(0x2, 0x6, 0x200000, &(0x7f0000000000)) 11:04:13 executing program 0: socketpair(0xf, 0x3, 0x10a, &(0x7f0000000040)) 11:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x95020000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x79010000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 4: socketpair(0x25, 0x5, 0x0, &(0x7f0000000000)) 11:04:13 executing program 2: socketpair(0x2, 0x6, 0x1000000, &(0x7f0000000000)) 11:04:13 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)) socketpair(0x1e, 0x3, 0x9, &(0x7f0000000040)) 11:04:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb5010000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x7a000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:13 executing program 0: socketpair(0xf, 0x3, 0x10b, &(0x7f0000000040)) 11:04:13 executing program 4: socketpair(0x25, 0x5, 0x0, &(0x7f0000000000)) 11:04:14 executing program 5: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)) 11:04:14 executing program 2: socketpair(0x2, 0x6, 0x1010000, &(0x7f0000000000)) 11:04:14 executing program 0: socketpair(0xf, 0x3, 0x10c, &(0x7f0000000040)) 11:04:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x81000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb9030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 5: socketpair(0xa, 0x3, 0x8a, &(0x7f00000000c0)) 11:04:14 executing program 2: socketpair(0x2, 0x6, 0x2000000, &(0x7f0000000000)) 11:04:14 executing program 0: socketpair(0xf, 0x3, 0x10d, &(0x7f0000000040)) 11:04:14 executing program 4: socketpair(0x25, 0x5, 0x0, &(0x7f0000000000)) 11:04:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 5: socketpair(0x0, 0x3, 0x8a, &(0x7f00000000c0)) 11:04:14 executing program 4: socketpair(0x25, 0x5, 0x1, 0x0) 11:04:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 0: socketpair(0xf, 0x3, 0x10e, &(0x7f0000000040)) 11:04:14 executing program 2: socketpair(0x2, 0x6, 0x2010000, &(0x7f0000000000)) 11:04:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85100000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 5: socketpair(0x0, 0x3, 0x8a, &(0x7f00000000c0)) 11:04:14 executing program 0: socketpair(0xf, 0x3, 0x10f, &(0x7f0000000040)) 11:04:14 executing program 4: socketpair(0x25, 0x5, 0x1, 0x0) 11:04:14 executing program 2: socketpair(0x2, 0x6, 0x3000000, &(0x7f0000000000)) 11:04:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf9030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85200000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 4: socketpair(0x25, 0x5, 0x1, 0x0) 11:04:14 executing program 2: socketpair(0x2, 0x6, 0x3010000, &(0x7f0000000000)) 11:04:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 0: socketpair(0xf, 0x3, 0x110, &(0x7f0000000040)) 11:04:14 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x90030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:14 executing program 5: socketpair(0x0, 0x3, 0x8a, &(0x7f00000000c0)) 11:04:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x85ffffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 2: socketpair(0x2, 0x6, 0x4000000, &(0x7f0000000000)) 11:04:15 executing program 0: socketpair(0xf, 0x3, 0x111, &(0x7f0000000040)) 11:04:15 executing program 4: socketpair(0x11, 0x3, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 11:04:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfe231a00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 5: socketpair(0xa, 0x0, 0x8a, &(0x7f00000000c0)) 11:04:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x90030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xff000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 2: socketpair(0x2, 0x6, 0x4010000, &(0x7f0000000000)) 11:04:15 executing program 4: socketpair(0x2, 0x6, 0xfd00, &(0x7f0000000000)) 11:04:15 executing program 0: socketpair(0xf, 0x3, 0x112, &(0x7f0000000040)) 11:04:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x95020000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 2: socketpair(0x2, 0x6, 0x5000000, &(0x7f0000000000)) 11:04:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfff00000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 5: socketpair(0xa, 0x0, 0x8a, &(0x7f00000000c0)) 11:04:15 executing program 4: socketpair(0x2, 0x6, 0x4010000, &(0x7f0000000000)) 11:04:15 executing program 0: socketpair(0xf, 0x3, 0x113, &(0x7f0000000040)) 11:04:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb5010000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 2: socketpair(0x2, 0x6, 0x5010000, &(0x7f0000000000)) 11:04:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfffff000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x90030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 0: socketpair(0xf, 0x3, 0x114, &(0x7f0000000040)) 11:04:15 executing program 2: socketpair(0x2, 0x6, 0x6000000, &(0x7f0000000000)) 11:04:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xb9030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 5: socketpair(0xa, 0x0, 0x8a, &(0x7f00000000c0)) 11:04:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xffffff85, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfffff000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:15 executing program 0: socketpair(0xf, 0x3, 0x115, &(0x7f0000000040)) 11:04:16 executing program 2: socketpair(0x2, 0x6, 0x6010000, &(0x7f0000000000)) 11:04:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xffffffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 5: socketpair(0xa, 0x3, 0x0, &(0x7f00000000c0)) 11:04:16 executing program 0: socketpair(0xf, 0x3, 0x116, &(0x7f0000000040)) 11:04:16 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x2d030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 2: socketpair(0x2, 0x6, 0x7000000, &(0x7f0000000000)) 11:04:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xec000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 2: socketpair(0x2, 0x6, 0x7010000, &(0x7f0000000000)) 11:04:16 executing program 5: socketpair(0xa, 0x3, 0x0, &(0x7f00000000c0)) 11:04:16 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xcd030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 0: socketpair(0xf, 0x3, 0x117, &(0x7f0000000040)) 11:04:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x3, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xf9030000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 2: socketpair(0x2, 0x6, 0x8000000, &(0x7f0000000000)) 11:04:16 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 0: socketpair(0xf, 0x3, 0x118, &(0x7f0000000040)) 11:04:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfd000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 5: socketpair(0xa, 0x3, 0x0, &(0x7f00000000c0)) 11:04:16 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 0: socketpair(0xf, 0x3, 0x119, &(0x7f0000000040)) 11:04:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x5, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:16 executing program 2: socketpair(0x2, 0x6, 0x8010000, &(0x7f0000000000)) 11:04:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfe231a00, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x6, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 0: socketpair(0xf, 0x3, 0x11a, &(0x7f0000000040)) 11:04:17 executing program 2: socketpair(0x2, 0x6, 0x9000000, &(0x7f0000000000)) 11:04:17 executing program 5: socketpair(0xa, 0x3, 0x8a, 0x0) 11:04:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xff000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x7, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 0: socketpair(0xf, 0x3, 0x11b, &(0x7f0000000040)) 11:04:17 executing program 5: socketpair(0xa, 0x3, 0x8a, 0x0) 11:04:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 2: socketpair(0x2, 0x6, 0x9010000, &(0x7f0000000000)) 11:04:17 executing program 0: socketpair(0xf, 0x3, 0x11c, &(0x7f0000000040)) 11:04:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfff00000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 2: socketpair(0x2, 0x6, 0xa000000, &(0x7f0000000000)) 11:04:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x8, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 5: socketpair(0xa, 0x3, 0x8a, 0x0) 11:04:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xfffff000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 0: socketpair(0xf, 0x3, 0x11d, &(0x7f0000000040)) 11:04:17 executing program 2: socketpair(0x2, 0x6, 0xa010000, &(0x7f0000000000)) 11:04:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x9, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 5: socketpair(0xa, 0x3, 0x0, &(0x7f00000000c0)) 11:04:17 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xffffff85, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:17 executing program 0: socketpair(0xf, 0x3, 0x11e, &(0x7f0000000040)) 11:04:17 executing program 2: socketpair(0x2, 0x6, 0xb000000, &(0x7f0000000000)) 11:04:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0xffffffff, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 0: socketpair(0xf, 0x3, 0x11f, &(0x7f0000000040)) 11:04:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000004e00)={&(0x7f00000022c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{0x0}, {0x0}], 0x2, &(0x7f0000004d40)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x12, 0x24, 0x0, 0x27c, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x12, 0x4, 0x8, 0x7, 0x3, 0x0, 0xfff, 0x0, 0x7fffffff}, r1, 0xa, 0xffffffffffffffff, 0x0) 11:04:18 executing program 2: socketpair(0x2, 0x6, 0xb010000, &(0x7f0000000000)) 11:04:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xb, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 0: socketpair(0xf, 0x3, 0x120, &(0x7f0000000040)) 11:04:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 2: socketpair(0x2, 0x6, 0xc000000, &(0x7f0000000000)) 11:04:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xc, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 0: socketpair(0xf, 0x3, 0x121, &(0x7f0000000040)) 11:04:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x3, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 2: socketpair(0x2, 0x6, 0xc010000, &(0x7f0000000000)) 11:04:18 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xd, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 0: socketpair(0xf, 0x3, 0x122, &(0x7f0000000040)) 11:04:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 2: socketpair(0x2, 0x6, 0xd000000, &(0x7f0000000000)) 11:04:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xe, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x5, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:18 executing program 0: socketpair(0xf, 0x3, 0x123, &(0x7f0000000040)) 11:04:19 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 2: socketpair(0x2, 0x6, 0xd010000, &(0x7f0000000000)) 11:04:19 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 0: socketpair(0xf, 0x3, 0x124, &(0x7f0000000040)) 11:04:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x6, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 2: socketpair(0x2, 0x6, 0xe000000, &(0x7f0000000000)) 11:04:19 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x12, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 0: socketpair(0xf, 0x3, 0x125, &(0x7f0000000040)) 11:04:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x7, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 2: socketpair(0x2, 0x6, 0xe010000, &(0x7f0000000000)) 11:04:19 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2f, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 0: socketpair(0xf, 0x3, 0x126, &(0x7f0000000040)) 11:04:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x8, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 2: socketpair(0x2, 0x6, 0xf000000, &(0x7f0000000000)) 11:04:19 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x9, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x20000290, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 0: socketpair(0xf, 0x3, 0x127, &(0x7f0000000040)) 11:04:19 executing program 2: socketpair(0x2, 0x6, 0xf010000, &(0x7f0000000000)) 11:04:19 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:19 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:20 executing program 0: socketpair(0xf, 0x3, 0x128, &(0x7f0000000040)) 11:04:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 2: socketpair(0x2, 0x6, 0x10000000, &(0x7f0000000000)) 11:04:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x3}, 0x10}, 0x78) 11:04:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xb, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 2: socketpair(0x2, 0x6, 0x10010000, &(0x7f0000000000)) 11:04:20 executing program 0: socketpair(0xf, 0x3, 0x129, &(0x7f0000000040)) 11:04:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4}, 0x10}, 0x78) 11:04:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xc, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 2: socketpair(0x2, 0x6, 0x11000000, &(0x7f0000000000)) 11:04:20 executing program 0: socketpair(0xf, 0x3, 0x12a, &(0x7f0000000040)) 11:04:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x6}, 0x10}, 0x78) 11:04:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xd, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 0: socketpair(0xf, 0x3, 0x12b, &(0x7f0000000040)) 11:04:20 executing program 2: socketpair(0x2, 0x6, 0x11010000, &(0x7f0000000000)) 11:04:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x7}, 0x10}, 0x78) 11:04:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:20 executing program 0: socketpair(0xf, 0x3, 0x12c, &(0x7f0000000040)) 11:04:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xe, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 2: socketpair(0x2, 0x6, 0x12000000, &(0x7f0000000000)) 11:04:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x8}, 0x10}, 0x78) 11:04:21 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 0: socketpair(0xf, 0x3, 0x12d, &(0x7f0000000040)) 11:04:21 executing program 2: socketpair(0x2, 0x6, 0x12010000, &(0x7f0000000000)) 11:04:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x9}, 0x10}, 0x78) 11:04:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x12, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 0: socketpair(0xf, 0x3, 0x12e, &(0x7f0000000040)) 11:04:21 executing program 2: socketpair(0x2, 0x6, 0x13000000, &(0x7f0000000000)) 11:04:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xa}, 0x10}, 0x78) 11:04:21 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2f, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 0: socketpair(0xf, 0x3, 0x12f, &(0x7f0000000040)) 11:04:21 executing program 2: socketpair(0x2, 0x6, 0x13010000, &(0x7f0000000000)) 11:04:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xb}, 0x10}, 0x78) 11:04:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x20000290, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 0: socketpair(0xf, 0x3, 0x130, &(0x7f0000000040)) 11:04:21 executing program 2: socketpair(0x2, 0x6, 0x14000000, &(0x7f0000000000)) 11:04:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xc}, 0x10}, 0x78) 11:04:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x131, &(0x7f0000000040)) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x14010000, &(0x7f0000000000)) 11:04:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xd}, 0x10}, 0x78) 11:04:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x132, &(0x7f0000000040)) 11:04:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x3}, 0x10}, 0x78) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x15000000, &(0x7f0000000000)) 11:04:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xe}, 0x10}, 0x78) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x15010000, &(0x7f0000000000)) 11:04:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x133, &(0x7f0000000040)) 11:04:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4}, 0x10}, 0x78) 11:04:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xf}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x134, &(0x7f0000000040)) 11:04:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x16000000, &(0x7f0000000000)) 11:04:22 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x6}, 0x10}, 0x78) 11:04:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x10}, 0x10}, 0x78) 11:04:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x135, &(0x7f0000000040)) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x16010000, &(0x7f0000000000)) 11:04:22 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x7}, 0x10}, 0x78) 11:04:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x11}, 0x10}, 0x78) 11:04:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:22 executing program 0: socketpair(0xf, 0x3, 0x136, &(0x7f0000000040)) 11:04:22 executing program 2: socketpair(0x2, 0x6, 0x17000000, &(0x7f0000000000)) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x8}, 0x10}, 0x78) 11:04:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x12}, 0x10}, 0x78) 11:04:23 executing program 0: socketpair(0xf, 0x3, 0x137, &(0x7f0000000040)) 11:04:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 2: socketpair(0x2, 0x6, 0x17010000, &(0x7f0000000000)) 11:04:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x9}, 0x10}, 0x78) 11:04:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x13}, 0x10}, 0x78) 11:04:23 executing program 0: socketpair(0xf, 0x3, 0x138, &(0x7f0000000040)) 11:04:23 executing program 2: socketpair(0x2, 0x6, 0x18000000, &(0x7f0000000000)) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xa}, 0x10}, 0x78) 11:04:23 executing program 0: socketpair(0xf, 0x3, 0x139, &(0x7f0000000040)) 11:04:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x14}, 0x10}, 0x78) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 2: socketpair(0x2, 0x6, 0x18010000, &(0x7f0000000000)) 11:04:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xb}, 0x10}, 0x78) 11:04:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x15}, 0x10}, 0x78) 11:04:23 executing program 0: socketpair(0xf, 0x3, 0x13a, &(0x7f0000000040)) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 2: socketpair(0x2, 0x6, 0x19000000, &(0x7f0000000000)) 11:04:23 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xc}, 0x10}, 0x78) 11:04:23 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x16}, 0x10}, 0x78) 11:04:23 executing program 0: socketpair(0xf, 0x3, 0x13b, &(0x7f0000000040)) 11:04:24 executing program 2: socketpair(0x2, 0x6, 0x19010000, &(0x7f0000000000)) 11:04:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x17}, 0x10}, 0x78) 11:04:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xd}, 0x10}, 0x78) 11:04:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 0: socketpair(0xf, 0x3, 0x13c, &(0x7f0000000040)) 11:04:24 executing program 2: socketpair(0x2, 0x6, 0x1a000000, &(0x7f0000000000)) 11:04:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x18}, 0x10}, 0x78) 11:04:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xe}, 0x10}, 0x78) 11:04:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 2: socketpair(0x2, 0x6, 0x1a010000, &(0x7f0000000000)) 11:04:24 executing program 0: socketpair(0xf, 0x3, 0x13d, &(0x7f0000000040)) 11:04:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x19}, 0x10}, 0x78) 11:04:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xf}, 0x10}, 0x78) 11:04:24 executing program 2: socketpair(0x2, 0x6, 0x1b000000, &(0x7f0000000000)) 11:04:24 executing program 0: socketpair(0xf, 0x3, 0x13e, &(0x7f0000000040)) 11:04:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x10}, 0x10}, 0x78) 11:04:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1a}, 0x10}, 0x78) 11:04:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:24 executing program 2: socketpair(0x2, 0x6, 0x1b010000, &(0x7f0000000000)) 11:04:24 executing program 0: socketpair(0xf, 0x3, 0x13f, &(0x7f0000000040)) 11:04:24 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x11}, 0x10}, 0x78) 11:04:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1b}, 0x10}, 0x78) 11:04:25 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 2: socketpair(0x2, 0x6, 0x1c000000, &(0x7f0000000000)) 11:04:25 executing program 0: socketpair(0xf, 0x3, 0x140, &(0x7f0000000040)) 11:04:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x12}, 0x10}, 0x78) 11:04:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1c}, 0x10}, 0x78) 11:04:25 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 2: socketpair(0x2, 0x6, 0x1c010000, &(0x7f0000000000)) 11:04:25 executing program 0: socketpair(0xf, 0x3, 0x141, &(0x7f0000000040)) 11:04:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x13}, 0x10}, 0x78) 11:04:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1d}, 0x10}, 0x78) 11:04:25 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 0: socketpair(0xf, 0x3, 0x142, &(0x7f0000000040)) 11:04:25 executing program 2: socketpair(0x2, 0x6, 0x1d000000, &(0x7f0000000000)) 11:04:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x14}, 0x10}, 0x78) 11:04:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1e}, 0x10}, 0x78) 11:04:25 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 0: socketpair(0xf, 0x3, 0x143, &(0x7f0000000040)) 11:04:25 executing program 2: socketpair(0x2, 0x6, 0x1d010000, &(0x7f0000000000)) 11:04:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x15}, 0x10}, 0x78) 11:04:25 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x21}, 0x10}, 0x78) 11:04:25 executing program 0: socketpair(0xf, 0x3, 0x144, &(0x7f0000000040)) 11:04:25 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:25 executing program 2: socketpair(0x2, 0x6, 0x1e000000, &(0x7f0000000000)) 11:04:26 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x16}, 0x10}, 0x78) 11:04:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x22}, 0x10}, 0x78) 11:04:26 executing program 0: socketpair(0xf, 0x3, 0x145, &(0x7f0000000040)) 11:04:26 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 2: socketpair(0x2, 0x6, 0x1e010000, &(0x7f0000000000)) 11:04:26 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 0: socketpair(0xf, 0x3, 0x146, &(0x7f0000000040)) 11:04:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x17}, 0x10}, 0x78) 11:04:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x23}, 0x10}, 0x78) 11:04:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:26 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 2: socketpair(0x2, 0x6, 0x1f000000, &(0x7f0000000000)) 11:04:26 executing program 0: socketpair(0xf, 0x3, 0x147, &(0x7f0000000040)) 11:04:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x18}, 0x10}, 0x78) 11:04:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:26 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 2: socketpair(0x2, 0x6, 0x1f010000, &(0x7f0000000000)) 11:04:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x19}, 0x10}, 0x78) 11:04:26 executing program 0: socketpair(0xf, 0x3, 0x148, &(0x7f0000000040)) 11:04:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2}, 0x10}, 0x78) 11:04:26 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:26 executing program 2: socketpair(0x2, 0x6, 0x20000000, &(0x7f0000000000)) 11:04:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1a}, 0x10}, 0x78) 11:04:26 executing program 0: socketpair(0xf, 0x3, 0x149, &(0x7f0000000040)) 11:04:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3}, 0x10}, 0x78) 11:04:27 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 2: socketpair(0x2, 0x6, 0x20010000, &(0x7f0000000000)) 11:04:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1b}, 0x10}, 0x78) 11:04:27 executing program 0: socketpair(0xf, 0x3, 0x14a, &(0x7f0000000040)) 11:04:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4}, 0x10}, 0x78) 11:04:27 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 2: socketpair(0x2, 0x6, 0x21000000, &(0x7f0000000000)) 11:04:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1c}, 0x10}, 0x78) 11:04:27 executing program 0: socketpair(0xf, 0x3, 0x14b, &(0x7f0000000040)) 11:04:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5}, 0x10}, 0x78) 11:04:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1d}, 0x10}, 0x78) 11:04:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 2: socketpair(0x2, 0x6, 0x21010000, &(0x7f0000000000)) 11:04:27 executing program 0: socketpair(0xf, 0x3, 0x14c, &(0x7f0000000040)) 11:04:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6}, 0x10}, 0x78) 11:04:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x1e}, 0x10}, 0x78) 11:04:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 0: socketpair(0xf, 0x3, 0x14d, &(0x7f0000000040)) 11:04:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 2: socketpair(0x2, 0x6, 0x22000000, &(0x7f0000000000)) 11:04:27 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x21}, 0x10}, 0x78) 11:04:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7}, 0x10}, 0x78) 11:04:28 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, 0x0}, 0x78) 11:04:28 executing program 0: socketpair(0xf, 0x3, 0x14e, &(0x7f0000000040)) 11:04:28 executing program 2: socketpair(0x2, 0x6, 0x22010000, &(0x7f0000000000)) 11:04:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x22}, 0x10}, 0x78) 11:04:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8}, 0x10}, 0x78) 11:04:28 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, 0x0}, 0x78) 11:04:28 executing program 0: socketpair(0xf, 0x3, 0x14f, &(0x7f0000000040)) 11:04:28 executing program 2: socketpair(0x2, 0x6, 0x23000000, &(0x7f0000000000)) 11:04:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa}, 0x10}, 0x78) 11:04:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x23}, 0x10}, 0x78) 11:04:28 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, 0x0}, 0x78) 11:04:28 executing program 0: socketpair(0xf, 0x3, 0x150, &(0x7f0000000040)) 11:04:28 executing program 2: socketpair(0x2, 0x6, 0x23010000, &(0x7f0000000000)) 11:04:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48}, 0x10}, 0x78) 11:04:28 executing program 0: socketpair(0xf, 0x3, 0x151, &(0x7f0000000040)) 11:04:28 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000280), 0x10}, 0x78) 11:04:28 executing program 2: socketpair(0x2, 0x6, 0x24000000, &(0x7f0000000000)) 11:04:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2}, 0x10}, 0x78) 11:04:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c}, 0x10}, 0x78) 11:04:28 executing program 0: socketpair(0xf, 0x3, 0x152, &(0x7f0000000040)) 11:04:28 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48}, 0x10}, 0x78) 11:04:28 executing program 2: socketpair(0x2, 0x6, 0x24010000, &(0x7f0000000000)) 11:04:28 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3}, 0x10}, 0x78) 11:04:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d}, 0x10}, 0x78) 11:04:29 executing program 0: socketpair(0xf, 0x3, 0x153, &(0x7f0000000040)) 11:04:29 executing program 4: socketpair(0xf, 0x3, 0x14f, &(0x7f0000000040)) 11:04:29 executing program 2: socketpair(0x2, 0x6, 0x25000000, &(0x7f0000000000)) 11:04:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4}, 0x10}, 0x78) 11:04:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x68}, 0x10}, 0x78) 11:04:29 executing program 0: socketpair(0xf, 0x3, 0x154, &(0x7f0000000040)) 11:04:29 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:29 executing program 2: socketpair(0x2, 0x6, 0x25010000, &(0x7f0000000000)) 11:04:29 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x22}, 0x10}, 0x78) 11:04:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c}, 0x10}, 0x78) 11:04:29 executing program 0: socketpair(0xf, 0x3, 0x155, &(0x7f0000000040)) 11:04:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5}, 0x10}, 0x78) 11:04:29 executing program 2: socketpair(0x2, 0x6, 0x26000000, &(0x7f0000000000)) 11:04:29 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x68}, 0x10}, 0x78) 11:04:29 executing program 0: socketpair(0xf, 0x3, 0x156, &(0x7f0000000040)) 11:04:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x74}, 0x10}, 0x78) 11:04:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:29 executing program 2: socketpair(0x2, 0x6, 0x26010000, &(0x7f0000000000)) 11:04:29 executing program 0: socketpair(0xf, 0x3, 0x157, &(0x7f0000000040)) 11:04:29 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5}, 0x10}, 0x78) 11:04:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a}, 0x10}, 0x78) 11:04:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6}, 0x10}, 0x78) 11:04:29 executing program 2: socketpair(0x2, 0x6, 0x27000000, &(0x7f0000000000)) 11:04:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85}, 0x10}, 0x78) 11:04:30 executing program 0: socketpair(0xf, 0x3, 0x158, &(0x7f0000000040)) 11:04:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:30 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x23}, 0x10}, 0x78) 11:04:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7}, 0x10}, 0x78) 11:04:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, 0x0}, 0x78) 11:04:30 executing program 2: socketpair(0x2, 0x6, 0x27010000, &(0x7f0000000000)) 11:04:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:30 executing program 0: socketpair(0xf, 0x3, 0x159, &(0x7f0000000040)) 11:04:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec}, 0x10}, 0x78) 11:04:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8}, 0x10}, 0x78) 11:04:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, 0x0}, 0x78) 11:04:30 executing program 2: socketpair(0x2, 0x6, 0x28000000, &(0x7f0000000000)) 11:04:30 executing program 4: socketpair(0xf, 0x3, 0x146, &(0x7f0000000040)) 11:04:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0}, 0x10}, 0x78) 11:04:30 executing program 0: socketpair(0xf, 0x3, 0x15a, &(0x7f0000000040)) 11:04:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa}, 0x10}, 0x78) 11:04:30 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x21}, 0x10}, 0x78) 11:04:30 executing program 2: socketpair(0x2, 0x6, 0x28010000, &(0x7f0000000000)) 11:04:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, 0x0}, 0x78) 11:04:30 executing program 0: socketpair(0xf, 0x3, 0x15b, &(0x7f0000000040)) 11:04:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd}, 0x10}, 0x78) 11:04:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48}, 0x10}, 0x78) 11:04:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280), 0x10}, 0x78) 11:04:30 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa}, 0x10}, 0x78) 11:04:30 executing program 0: socketpair(0xf, 0x3, 0x15c, &(0x7f0000000040)) 11:04:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x179}, 0x10}, 0x78) 11:04:30 executing program 2: socketpair(0x2, 0x6, 0x29000000, &(0x7f0000000000)) 11:04:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c}, 0x10}, 0x78) 11:04:31 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd}, 0x10}, 0x78) 11:04:31 executing program 0: socketpair(0xf, 0x3, 0x15d, &(0x7f0000000040)) 11:04:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x10}, 0x10}, 0x78) 11:04:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d}, 0x10}, 0x78) 11:04:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1b5}, 0x10}, 0x78) 11:04:31 executing program 2: socketpair(0x2, 0x6, 0x29010000, &(0x7f0000000000)) 11:04:31 executing program 4: socketpair(0x2, 0x6, 0x1b000000, &(0x7f0000000000)) 11:04:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x68}, 0x10}, 0x78) 11:04:31 executing program 0: socketpair(0xf, 0x3, 0x15e, &(0x7f0000000040)) 11:04:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d}, 0x10}, 0x78) 11:04:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x295}, 0x10}, 0x78) 11:04:31 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:31 executing program 2: socketpair(0x2, 0x6, 0x2a000000, &(0x7f0000000000)) 11:04:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c}, 0x10}, 0x78) 11:04:31 executing program 0: socketpair(0xf, 0x3, 0x15f, &(0x7f0000000040)) 11:04:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x15}, 0x10}, 0x78) 11:04:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x300}, 0x10}, 0x78) 11:04:31 executing program 2: socketpair(0x2, 0x6, 0x2a010000, &(0x7f0000000000)) 11:04:31 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0xa, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x74}, 0x10}, 0x78) 11:04:31 executing program 0: socketpair(0xf, 0x3, 0x160, &(0x7f0000000040)) 11:04:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x32d}, 0x10}, 0x78) 11:04:31 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0xc}, 0x10}, 0x78) 11:04:31 executing program 2: socketpair(0x2, 0x6, 0x2b000000, &(0x7f0000000000)) 11:04:31 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a}, 0x10}, 0x78) 11:04:32 executing program 0: socketpair(0xf, 0x3, 0x161, &(0x7f0000000040)) 11:04:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x351}, 0x10}, 0x78) 11:04:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85}, 0x10}, 0x78) 11:04:32 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:32 executing program 2: socketpair(0x2, 0x6, 0x2b010000, &(0x7f0000000000)) 11:04:32 executing program 0: socketpair(0xf, 0x3, 0x162, &(0x7f0000000040)) 11:04:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x390}, 0x10}, 0x78) 11:04:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec}, 0x10}, 0x78) 11:04:32 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:32 executing program 2: socketpair(0x2, 0x6, 0x2c000000, &(0x7f0000000000)) 11:04:32 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:32 executing program 0: socketpair(0xf, 0x3, 0x163, &(0x7f0000000040)) 11:04:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3b9}, 0x10}, 0x78) 11:04:32 executing program 2: socketpair(0x2, 0x6, 0x2c010000, &(0x7f0000000000)) 11:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0}, 0x10}, 0x78) 11:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:32 executing program 0: socketpair(0xf, 0x3, 0x164, &(0x7f0000000040)) 11:04:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3cd}, 0x10}, 0x78) 11:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:32 executing program 2: socketpair(0x2, 0x6, 0x2d000000, &(0x7f0000000000)) 11:04:32 executing program 0: socketpair(0xf, 0x3, 0x165, &(0x7f0000000040)) 11:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd}, 0x10}, 0x78) 11:04:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3f9}, 0x10}, 0x78) 11:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x179}, 0x10}, 0x78) 11:04:33 executing program 2: socketpair(0x2, 0x6, 0x2d010000, &(0x7f0000000000)) 11:04:33 executing program 0: socketpair(0xf, 0x3, 0x166, &(0x7f0000000040)) 11:04:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x500}, 0x10}, 0x78) 11:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:33 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:33 executing program 2: socketpair(0x2, 0x6, 0x2e000000, &(0x7f0000000000)) 11:04:33 executing program 0: socketpair(0xf, 0x3, 0x167, &(0x7f0000000040)) 11:04:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1b5}, 0x10}, 0x78) 11:04:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x600}, 0x10}, 0x78) 11:04:33 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:33 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:33 executing program 0: socketpair(0xf, 0x3, 0x168, &(0x7f0000000040)) 11:04:33 executing program 2: socketpair(0x2, 0x6, 0x2e010000, &(0x7f0000000000)) 11:04:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x295}, 0x10}, 0x78) 11:04:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x700}, 0x10}, 0x78) 11:04:33 executing program 0: socketpair(0xf, 0x3, 0x169, &(0x7f0000000040)) 11:04:33 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:33 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:33 executing program 2: socketpair(0x2, 0x6, 0x2f000000, &(0x7f0000000000)) 11:04:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa00}, 0x10}, 0x78) 11:04:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x300}, 0x10}, 0x78) 11:04:34 executing program 0: socketpair(0xf, 0x3, 0x16a, &(0x7f0000000040)) 11:04:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:34 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:34 executing program 2: socketpair(0x2, 0x6, 0x2f010000, &(0x7f0000000000)) 11:04:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1085}, 0x10}, 0x78) 11:04:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x32d}, 0x10}, 0x78) 11:04:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:34 executing program 0: socketpair(0xf, 0x3, 0x16b, &(0x7f0000000040)) 11:04:34 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:34 executing program 2: socketpair(0x2, 0x6, 0x30000000, &(0x7f0000000000)) 11:04:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1840}, 0x10}, 0x78) 11:04:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x351}, 0x10}, 0x78) 11:04:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:34 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:34 executing program 0: socketpair(0xf, 0x3, 0x16c, &(0x7f0000000040)) 11:04:34 executing program 2: socketpair(0x2, 0x6, 0x30010000, &(0x7f0000000000)) 11:04:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f00}, 0x10}, 0x78) 11:04:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x390}, 0x10}, 0x78) 11:04:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:34 executing program 0: socketpair(0xf, 0x3, 0x16d, &(0x7f0000000040)) 11:04:34 executing program 2: socketpair(0x2, 0x6, 0x31000000, &(0x7f0000000000)) 11:04:34 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3b9}, 0x10}, 0x78) 11:04:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2000}, 0x10}, 0x78) 11:04:34 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:34 executing program 0: socketpair(0xf, 0x3, 0x16e, &(0x7f0000000040)) 11:04:34 executing program 2: socketpair(0x2, 0x6, 0x31010000, &(0x7f0000000000)) 11:04:34 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3cd}, 0x10}, 0x78) 11:04:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2085}, 0x10}, 0x78) 11:04:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:35 executing program 0: socketpair(0xf, 0x3, 0x16f, &(0x7f0000000040)) 11:04:35 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:35 executing program 2: socketpair(0x2, 0x6, 0x32000000, &(0x7f0000000000)) 11:04:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3f9}, 0x10}, 0x78) 11:04:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2d03}, 0x10}, 0x78) 11:04:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:35 executing program 0: socketpair(0xf, 0x3, 0x170, &(0x7f0000000040)) 11:04:35 executing program 2: socketpair(0x2, 0x6, 0x32010000, &(0x7f0000000000)) 11:04:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x500}, 0x10}, 0x78) 11:04:35 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4018}, 0x10}, 0x78) 11:04:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:35 executing program 0: socketpair(0xf, 0x3, 0x171, &(0x7f0000000040)) 11:04:35 executing program 2: socketpair(0x2, 0x6, 0x33000000, &(0x7f0000000000)) 11:04:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x600}, 0x10}, 0x78) 11:04:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4800}, 0x10}, 0x78) 11:04:35 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:35 executing program 2: socketpair(0x2, 0x6, 0x33010000, &(0x7f0000000000)) 11:04:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:35 executing program 0: socketpair(0xf, 0x3, 0x172, &(0x7f0000000040)) 11:04:35 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c00}, 0x10}, 0x78) 11:04:35 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x700}, 0x10}, 0x78) 11:04:35 executing program 2: socketpair(0x2, 0x6, 0x34000000, &(0x7f0000000000)) 11:04:36 executing program 0: socketpair(0xf, 0x3, 0x173, &(0x7f0000000040)) 11:04:36 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5103}, 0x10}, 0x78) 11:04:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa00}, 0x10}, 0x78) 11:04:36 executing program 0: socketpair(0xf, 0x3, 0x174, &(0x7f0000000040)) 11:04:36 executing program 2: socketpair(0x2, 0x6, 0x34010000, &(0x7f0000000000)) 11:04:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d00}, 0x10}, 0x78) 11:04:36 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1085}, 0x10}, 0x78) 11:04:36 executing program 0: socketpair(0xf, 0x3, 0x175, &(0x7f0000000040)) 11:04:36 executing program 2: socketpair(0x2, 0x6, 0x35000000, &(0x7f0000000000)) 11:04:36 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6800}, 0x10}, 0x78) 11:04:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1840}, 0x10}, 0x78) 11:04:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:36 executing program 0: socketpair(0xf, 0x3, 0x176, &(0x7f0000000040)) 11:04:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c00}, 0x10}, 0x78) 11:04:36 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:36 executing program 2: socketpair(0x2, 0x6, 0x35010000, &(0x7f0000000000)) 11:04:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f00}, 0x10}, 0x78) 11:04:36 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:36 executing program 0: socketpair(0xf, 0x3, 0x177, &(0x7f0000000040)) 11:04:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7400}, 0x10}, 0x78) 11:04:36 executing program 2: socketpair(0x2, 0x6, 0x36000000, &(0x7f0000000000)) 11:04:36 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2000}, 0x10}, 0x78) 11:04:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x178, &(0x7f0000000040)) 11:04:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7901}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x36010000, &(0x7f0000000000)) 11:04:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2085}, 0x10}, 0x78) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a00}, 0x10}, 0x78) 11:04:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x179, &(0x7f0000000040)) 11:04:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x37000000, &(0x7f0000000000)) 11:04:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2d03}, 0x10}, 0x78) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8100}, 0x10}, 0x78) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x17a, &(0x7f0000000040)) 11:04:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8500}, 0x10}, 0x78) 11:04:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x37010000, &(0x7f0000000000)) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x17b, &(0x7f0000000040)) 11:04:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4018}, 0x10}, 0x78) 11:04:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x38000000, &(0x7f0000000000)) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x17c, &(0x7f0000000040)) 11:04:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4800}, 0x10}, 0x78) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8510}, 0x10}, 0x78) 11:04:37 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x38010000, &(0x7f0000000000)) 11:04:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:37 executing program 0: socketpair(0xf, 0x3, 0x17d, &(0x7f0000000040)) 11:04:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8520}, 0x10}, 0x78) 11:04:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c00}, 0x10}, 0x78) 11:04:37 executing program 2: socketpair(0x2, 0x6, 0x39000000, &(0x7f0000000000)) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5103}, 0x10}, 0x78) 11:04:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x9003}, 0x10}, 0x78) 11:04:38 executing program 0: socketpair(0xf, 0x3, 0x17e, &(0x7f0000000040)) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x39010000, &(0x7f0000000000)) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x9502}, 0x10}, 0x78) 11:04:38 executing program 0: socketpair(0xf, 0x3, 0x17f, &(0x7f0000000040)) 11:04:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d00}, 0x10}, 0x78) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x3a000000, &(0x7f0000000000)) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb501}, 0x10}, 0x78) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6800}, 0x10}, 0x78) 11:04:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:38 executing program 0: socketpair(0xf, 0x3, 0x180, &(0x7f0000000040)) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x3a010000, &(0x7f0000000000)) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb903}, 0x10}, 0x78) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c00}, 0x10}, 0x78) 11:04:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x3b000000, &(0x7f0000000000)) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 0: socketpair(0xf, 0x3, 0x181, &(0x7f0000000040)) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7400}, 0x10}, 0x78) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x3b010000, &(0x7f0000000000)) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xcd03}, 0x10}, 0x78) 11:04:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 2: socketpair(0x2, 0x6, 0x3c000000, &(0x7f0000000000)) 11:04:38 executing program 0: socketpair(0xf, 0x3, 0x182, &(0x7f0000000040)) 11:04:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7901}, 0x10}, 0x78) 11:04:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec00}, 0x10}, 0x78) 11:04:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:39 executing program 0: socketpair(0xf, 0x3, 0x183, &(0x7f0000000040)) 11:04:39 executing program 2: socketpair(0x2, 0x6, 0x3c010000, &(0x7f0000000000)) 11:04:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a00}, 0x10}, 0x78) 11:04:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf000}, 0x10}, 0x78) 11:04:39 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:39 executing program 0: socketpair(0xf, 0x3, 0x184, &(0x7f0000000040)) 11:04:39 executing program 2: socketpair(0x2, 0x6, 0x3d000000, &(0x7f0000000000)) 11:04:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8100}, 0x10}, 0x78) 11:04:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0ff}, 0x10}, 0x78) 11:04:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:39 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:39 executing program 0: socketpair(0xf, 0x3, 0x185, &(0x7f0000000040)) 11:04:39 executing program 2: socketpair(0x2, 0x6, 0x3d010000, &(0x7f0000000000)) 11:04:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8500}, 0x10}, 0x78) 11:04:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf903}, 0x10}, 0x78) 11:04:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:39 executing program 2: socketpair(0x2, 0x6, 0x3e000000, &(0x7f0000000000)) 11:04:39 executing program 0: socketpair(0xf, 0x3, 0x186, &(0x7f0000000040)) 11:04:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8510}, 0x10}, 0x78) 11:04:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd00}, 0x10}, 0x78) 11:04:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:39 executing program 2: socketpair(0x2, 0x6, 0x3e010000, &(0x7f0000000000)) 11:04:39 executing program 0: socketpair(0xf, 0x3, 0x187, &(0x7f0000000040)) 11:04:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8520}, 0x10}, 0x78) 11:04:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xff00}, 0x10}, 0x78) 11:04:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x3f000000, &(0x7f0000000000)) 11:04:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x9003}, 0x10}, 0x78) 11:04:40 executing program 0: socketpair(0xf, 0x3, 0x188, &(0x7f0000000040)) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1a23fe}, 0x10}, 0x78) 11:04:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x3f010000, &(0x7f0000000000)) 11:04:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x200000}, 0x10}, 0x78) 11:04:40 executing program 0: socketpair(0xf, 0x3, 0x189, &(0x7f0000000040)) 11:04:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x9502}, 0x10}, 0x78) 11:04:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:40 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x40000000, &(0x7f0000000000)) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0ffff}, 0x10}, 0x78) 11:04:40 executing program 0: socketpair(0xf, 0x3, 0x18a, &(0x7f0000000040)) 11:04:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb501}, 0x10}, 0x78) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x40010000, &(0x7f0000000000)) 11:04:40 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1000000}, 0x10}, 0x78) 11:04:40 executing program 0: socketpair(0xf, 0x3, 0x18b, &(0x7f0000000040)) 11:04:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb903}, 0x10}, 0x78) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x41000000, &(0x7f0000000000)) 11:04:40 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2000000}, 0x10}, 0x78) 11:04:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:40 executing program 0: socketpair(0xf, 0x3, 0x18c, &(0x7f0000000040)) 11:04:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xcd03}, 0x10}, 0x78) 11:04:40 executing program 2: socketpair(0x2, 0x6, 0x41010000, &(0x7f0000000000)) 11:04:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3000000}, 0x10}, 0x78) 11:04:40 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:41 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:41 executing program 0: socketpair(0xf, 0x3, 0x18d, &(0x7f0000000040)) 11:04:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec00}, 0x10}, 0x78) 11:04:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:41 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4000000}, 0x10}, 0x78) 11:04:41 executing program 2: socketpair(0x2, 0x6, 0x42000000, &(0x7f0000000000)) 11:04:41 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:41 executing program 0: socketpair(0xf, 0x3, 0x18e, &(0x7f0000000040)) 11:04:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf000}, 0x10}, 0x78) 11:04:41 executing program 2: socketpair(0x2, 0x6, 0x42010000, &(0x7f0000000000)) 11:04:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:41 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5000000}, 0x10}, 0x78) 11:04:41 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:41 executing program 0: socketpair(0xf, 0x3, 0x18f, &(0x7f0000000040)) 11:04:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0ff}, 0x10}, 0x78) 11:04:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:41 executing program 2: socketpair(0x2, 0x6, 0x43000000, &(0x7f0000000000)) 11:04:41 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6000000}, 0x10}, 0x78) 11:04:41 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:41 executing program 0: socketpair(0xf, 0x3, 0x190, &(0x7f0000000040)) 11:04:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf903}, 0x10}, 0x78) 11:04:41 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:41 executing program 2: socketpair(0x2, 0x6, 0x43010000, &(0x7f0000000000)) 11:04:41 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7000000}, 0x10}, 0x78) 11:04:41 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd00}, 0x10}, 0x78) 11:04:41 executing program 0: socketpair(0xf, 0x3, 0x191, &(0x7f0000000040)) 11:04:41 executing program 2: socketpair(0x2, 0x6, 0x44000000, &(0x7f0000000000)) 11:04:42 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:42 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8000000}, 0x10}, 0x78) 11:04:42 executing program 0: socketpair(0xf, 0x3, 0x192, &(0x7f0000000040)) 11:04:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xff00}, 0x10}, 0x78) 11:04:42 executing program 2: socketpair(0x2, 0x6, 0x44010000, &(0x7f0000000000)) 11:04:42 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa000000}, 0x10}, 0x78) 11:04:42 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1a23fe}, 0x10}, 0x78) 11:04:42 executing program 0: socketpair(0xf, 0x3, 0x193, &(0x7f0000000040)) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x18400000}, 0x10}, 0x78) 11:04:42 executing program 2: socketpair(0x2, 0x6, 0x45000000, &(0x7f0000000000)) 11:04:42 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x200000}, 0x10}, 0x78) 11:04:42 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:42 executing program 2: socketpair(0x2, 0x6, 0x45010000, &(0x7f0000000000)) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f000000}, 0x10}, 0x78) 11:04:42 executing program 0: socketpair(0xf, 0x3, 0x194, &(0x7f0000000040)) 11:04:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:42 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0ffff}, 0x10}, 0x78) 11:04:42 executing program 2: socketpair(0x2, 0x6, 0x46000000, &(0x7f0000000000)) 11:04:42 executing program 0: socketpair(0xf, 0x3, 0x195, &(0x7f0000000040)) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2d030000}, 0x10}, 0x78) 11:04:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:42 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1000000}, 0x10}, 0x78) 11:04:42 executing program 2: socketpair(0x2, 0x6, 0x46010000, &(0x7f0000000000)) 11:04:42 executing program 0: socketpair(0xf, 0x3, 0x196, &(0x7f0000000040)) 11:04:42 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48000000}, 0x10}, 0x78) 11:04:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2000000}, 0x10}, 0x78) 11:04:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:43 executing program 2: socketpair(0x2, 0x6, 0x47000000, &(0x7f0000000000)) 11:04:43 executing program 0: socketpair(0xf, 0x3, 0x197, &(0x7f0000000040)) 11:04:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:04:43 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c000000}, 0x10}, 0x78) 11:04:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x3000000}, 0x10}, 0x78) 11:04:43 executing program 2: socketpair(0x2, 0x6, 0x47010000, &(0x7f0000000000)) 11:04:43 executing program 0: socketpair(0xf, 0x3, 0x198, &(0x7f0000000040)) 11:04:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:04:43 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x51030000}, 0x10}, 0x78) 11:04:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4000000}, 0x10}, 0x78) 11:04:43 executing program 0: socketpair(0xf, 0x3, 0x199, &(0x7f0000000040)) 11:04:43 executing program 2: socketpair(0x2, 0x6, 0x48000000, &(0x7f0000000000)) 11:04:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:04:43 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d000000}, 0x10}, 0x78) 11:04:43 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x78) 11:04:43 executing program 0: socketpair(0xf, 0x3, 0x19a, &(0x7f0000000040)) 11:04:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5000000}, 0x10}, 0x78) 11:04:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), 0x10}, 0x78) 11:04:43 executing program 2: socketpair(0x2, 0x6, 0x48010000, &(0x7f0000000000)) 11:04:43 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x78) 11:04:43 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x68000000}, 0x10}, 0x78) 11:04:43 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), 0x10}, 0x78) 11:04:43 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6000000}, 0x10}, 0x78) 11:04:43 executing program 0: socketpair(0xf, 0x3, 0x19b, &(0x7f0000000040)) 11:04:43 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x78) 11:04:44 executing program 2: socketpair(0x2, 0x6, 0x49000000, &(0x7f0000000000)) 11:04:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), 0x10}, 0x78) 11:04:44 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c000000}, 0x10}, 0x78) 11:04:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7000000}, 0x10}, 0x78) 11:04:44 executing program 0: socketpair(0xf, 0x3, 0x19c, &(0x7f0000000040)) 11:04:44 executing program 2: socketpair(0x2, 0x6, 0x49010000, &(0x7f0000000000)) 11:04:44 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280), 0x10}, 0x78) 11:04:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf0ffff}, 0x10}, 0x78) 11:04:44 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x74000000}, 0x10}, 0x78) 11:04:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x8000000}, 0x10}, 0x78) 11:04:44 executing program 0: socketpair(0xf, 0x3, 0x19d, &(0x7f0000000040)) 11:04:44 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f000000}, 0x10}, 0x78) 11:04:44 executing program 2: socketpair(0x2, 0x6, 0x4a000000, &(0x7f0000000000)) 11:04:44 executing program 0: socketpair(0xf, 0x3, 0x19e, &(0x7f0000000040)) 11:04:44 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x79010000}, 0x10}, 0x78) 11:04:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xa000000}, 0x10}, 0x78) 11:04:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb903}, 0x10}, 0x78) 11:04:44 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x200000}, 0x10}, 0x78) 11:04:44 executing program 2: socketpair(0x2, 0x6, 0x4a010000, &(0x7f0000000000)) 11:04:44 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a000000}, 0x10}, 0x78) 11:04:44 executing program 0: socketpair(0xf, 0x3, 0x19f, &(0x7f0000000040)) 11:04:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x18400000}, 0x10}, 0x78) 11:04:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x9003}, 0x10}, 0x78) 11:04:44 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xff00}, 0x10}, 0x78) 11:04:44 executing program 2: socketpair(0x2, 0x6, 0x4b000000, &(0x7f0000000000)) 11:04:44 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x81000000}, 0x10}, 0x78) 11:04:44 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f000000}, 0x10}, 0x78) 11:04:44 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x18400000}, 0x10}, 0x78) 11:04:44 executing program 0: socketpair(0xf, 0x3, 0x1a0, &(0x7f0000000040)) 11:04:45 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:45 executing program 2: socketpair(0x2, 0x6, 0x4b010000, &(0x7f0000000000)) 11:04:45 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85000000}, 0x10}, 0x78) 11:04:45 executing program 0: socketpair(0xf, 0x3, 0x1a1, &(0x7f0000000040)) 11:04:45 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x2d030000}, 0x10}, 0x78) 11:04:45 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:45 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6800}, 0x10}, 0x78) 11:04:45 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85100000}, 0x10}, 0x78) 11:04:45 executing program 2: socketpair(0x2, 0x6, 0x4c000000, &(0x7f0000000000)) 11:04:45 executing program 0: socketpair(0xf, 0x3, 0x1a2, &(0x7f0000000040)) 11:04:45 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85200000}, 0x10}, 0x78) 11:04:45 executing program 5: socketpair(0x2, 0x6, 0x39000000, &(0x7f0000000000)) 11:04:45 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2}, 0x10}, 0x78) 11:04:45 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48000000}, 0x10}, 0x78) 11:04:45 executing program 0: socketpair(0xf, 0x3, 0x1a3, &(0x7f0000000040)) 11:04:45 executing program 2: socketpair(0x2, 0x6, 0x4c010000, &(0x7f0000000000)) 11:04:45 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85ffffff}, 0x10}, 0x78) 11:04:45 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:45 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:45 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x4c000000}, 0x10}, 0x78) 11:04:45 executing program 0: socketpair(0xf, 0x3, 0x1a4, &(0x7f0000000040)) 11:04:45 executing program 2: socketpair(0x2, 0x6, 0x4d000000, &(0x7f0000000000)) 11:04:45 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x90030000}, 0x10}, 0x78) 11:04:45 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x48000000}, 0x10}, 0x78) 11:04:45 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x51030000}, 0x10}, 0x78) 11:04:45 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x1f00}, 0x10}, 0x78) 11:04:45 executing program 0: socketpair(0xf, 0x3, 0x1a5, &(0x7f0000000040)) 11:04:45 executing program 2: socketpair(0x2, 0x6, 0x4d010000, &(0x7f0000000000)) 11:04:46 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x95020000}, 0x10}, 0x78) 11:04:46 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x11, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 4: socketpair(0xf, 0x3, 0x165, &(0x7f0000000040)) 11:04:46 executing program 2: socketpair(0x2, 0x6, 0x4e000000, &(0x7f0000000000)) 11:04:46 executing program 0: socketpair(0xf, 0x3, 0x1a6, &(0x7f0000000040)) 11:04:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x5d000000}, 0x10}, 0x78) 11:04:46 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb5010000}, 0x10}, 0x78) 11:04:46 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x6c000000, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 2: socketpair(0x2, 0x6, 0x4e010000, &(0x7f0000000000)) 11:04:46 executing program 0: socketpair(0xf, 0x3, 0x1a7, &(0x7f0000000040)) 11:04:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x68000000}, 0x10}, 0x78) 11:04:46 executing program 5: socketpair(0x25, 0x5, 0x1, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0xe}, 0x10) r0 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x6f, 0x7, 0x5, 0x0, 0x79b, 0x5, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4c00, 0x0, 0xcbdd, 0x6, 0x7, 0x80, 0x7ff, 0x0, 0x2f25, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) 11:04:46 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb9030000}, 0x10}, 0x78) 11:04:46 executing program 4: socketpair(0x11, 0x3, 0xcd000000, &(0x7f0000000000)) 11:04:46 executing program 0: socketpair(0xf, 0x3, 0x1a8, &(0x7f0000000040)) 11:04:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6c000000}, 0x10}, 0x78) 11:04:46 executing program 2: socketpair(0x2, 0x6, 0x4f000000, &(0x7f0000000000)) 11:04:46 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xcd030000}, 0x10}, 0x78) 11:04:46 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xfe231a00, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 0: socketpair(0xf, 0x3, 0x1a9, &(0x7f0000000040)) 11:04:46 executing program 2: socketpair(0x2, 0x6, 0x4f010000, &(0x7f0000000000)) 11:04:46 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec000000}, 0x10}, 0x78) 11:04:46 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x74000000}, 0x10}, 0x78) 11:04:46 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xf9030000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:46 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0x1, &(0x7f00000000c0)="d8c6d58e801763aa6e233d308b56d0069552dad0261c9b60a691cd76f30217943fb9f5f51f14714ae7cebbf3886f20d8506e24161ebcd181084cd5717dc292565e5b8ae8db5b3cb0094d89b0bc4b379bcc1aa37ef13b1443c49d11cd72c6611c3361b985fbeaf3cf2f2d30b2ca9a118645087e24df003e99b7bf7af1c7133b4ab4ad164576df6b2c07301c8d17660ca814fd953d3d0a35910ccaf7c8f0a29cdae90ba7a231dc21a88139c477f36797", &(0x7f0000000180)=""/171}, 0x20) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000700000000000000000000002f5b2000100000001834000003000000000000000000000008e74000050000001800000003000a388ce70c670af50000000000007531000017be0c00000000001838000002000000000000000000000085000000a3000000ca500200f0162dff022bf4ff0400000085100000feffffff9500000000000000cb58e955f49a464cf7d19f659c226118e03be071b1795e4936679af31ccf35d9053c189222b7d628b2a18a4fdba73ac24af6"], &(0x7f0000000300)='GPL\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x1, 0xfffffffc, 0x6}, 0x10}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={@cgroup, r0, 0xf, 0x2, r1}, 0x14) 11:04:46 executing program 0: socketpair(0xf, 0x3, 0x1aa, &(0x7f0000000040)) 11:04:46 executing program 2: socketpair(0x2, 0x6, 0x50000000, &(0x7f0000000000)) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf9030000}, 0x10}, 0x78) 11:04:47 executing program 4: socketpair(0x11, 0x3, 0xca010000, &(0x7f0000000000)) 11:04:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x79010000}, 0x10}, 0x78) 11:04:47 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xffffff85, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:47 executing program 2: socketpair(0x2, 0x6, 0x50010000, &(0x7f0000000000)) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd000000}, 0x10}, 0x78) 11:04:47 executing program 0: socketpair(0xf, 0x3, 0x1ab, &(0x7f0000000040)) 11:04:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10000) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x37}, @map={0x18, 0x6, 0x1, 0x0, r1}, @exit]}, &(0x7f00000001c0)='syzkaller\x00', 0x7b0, 0x29, &(0x7f0000000200)=""/41, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x2, 0x2, 0x400}, 0x10, 0xc416, r2}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={r3, 0x10, &(0x7f0000000040)={&(0x7f0000000a40)=""/190, 0xbe}}, 0x10) 11:04:47 executing program 4: socketpair(0x11, 0x3, 0xc9010000, &(0x7f0000000000)) 11:04:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a000000}, 0x10}, 0x78) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfe231a00}, 0x10}, 0x78) 11:04:47 executing program 0: socketpair(0xf, 0x3, 0x1ac, &(0x7f0000000040)) 11:04:47 executing program 2: socketpair(0x2, 0x6, 0x51000000, &(0x7f0000000000)) 11:04:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x81000000}, 0x10}, 0x78) 11:04:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10000) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x37}, @map={0x18, 0x6, 0x1, 0x0, r1}, @exit]}, &(0x7f00000001c0)='syzkaller\x00', 0x7b0, 0x29, &(0x7f0000000200)=""/41, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x2, 0x2, 0x400}, 0x10, 0xc416, r2}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={r3, 0x10, &(0x7f0000000040)={&(0x7f0000000a40)=""/190, 0xbe}}, 0x10) 11:04:47 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x7a000000}, 0x10}, 0x78) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xff000000}, 0x10}, 0x78) 11:04:47 executing program 0: socketpair(0xf, 0x3, 0x1ad, &(0x7f0000000040)) 11:04:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85000000}, 0x10}, 0x78) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfff00000}, 0x10}, 0x78) 11:04:47 executing program 2: socketpair(0x2, 0x6, 0x51010000, &(0x7f0000000000)) 11:04:47 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r3, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r4 = openat$cgroup_ro(r1, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r4, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x5, 0x45, 0x0, 0x0, 0xaf508457176c7127, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x40, 0x5}, 0x4100, 0x4000000000000, 0x7, 0x8, 0xbc4a, 0x7fffffff, 0x1, 0x0, 0x6, 0x0, 0x525}, r2, 0xf, r2, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r0, 0x0, 0xb, 0xb07, &(0x7f0000001200)="3f00000001000000000000", &(0x7f0000001640)=""/4105, 0x7, 0x0, 0x77, 0xf7, &(0x7f0000001100)="161df9250173fda18edc0a919fcf8b9553d0958ebf3ed8d92cbe2da117563fb70ea0019673ad52ef118c75134b64ce2d9ff6bccf3ca888257e326bb64417c963bfa764db97defd4fd925a4dee450a4a5e3b268001839ecc76688c4c9947745cc2b2135af5e091518bbd9db290efbba4acf0420dcde0c7a", &(0x7f00000000c0)="d25a0f1c33e87c7764894103803bce3e0b29d7135e17227c94b1f0ac50a1f327557d5615bea9afeca39294a716b1c03eb7fdf34dc156356728bb74194145098f628e316b7cdf771dd6bc54051b35ac5714edafa75c02098b0d1ef66f3016ffd8510395aec48a08aa329487632f41f133df6d6df8cb77e868d81b5e6b46321ed6454461e97dac9a9a517e80da813b9b0c2cc788001fee43d0476a37b1274fdce3d9410e", 0x1, 0x101}, 0x48) 11:04:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10000) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x37}, @map={0x18, 0x6, 0x1, 0x0, r1}, @exit]}, &(0x7f00000001c0)='syzkaller\x00', 0x7b0, 0x29, &(0x7f0000000200)=""/41, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x2, 0x2, 0x400}, 0x10, 0xc416, r2}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={r3, 0x10, &(0x7f0000000040)={&(0x7f0000000a40)=""/190, 0xbe}}, 0x10) 11:04:47 executing program 0: socketpair(0xf, 0x3, 0x1ae, &(0x7f0000000040)) 11:04:47 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85100000}, 0x10}, 0x78) 11:04:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfffff000}, 0x10}, 0x78) 11:04:47 executing program 2: socketpair(0x2, 0x6, 0x52000000, &(0x7f0000000000)) 11:04:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10000) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x37}, @map={0x18, 0x6, 0x1, 0x0, r1}, @exit]}, &(0x7f00000001c0)='syzkaller\x00', 0x7b0, 0x29, &(0x7f0000000200)=""/41, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x2, 0x2, 0x400}, 0x10, 0xc416, r2}, 0x78) 11:04:47 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r3, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r4 = openat$cgroup_ro(r1, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r4, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x5, 0x45, 0x0, 0x0, 0xaf508457176c7127, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x40, 0x5}, 0x4100, 0x4000000000000, 0x7, 0x8, 0xbc4a, 0x7fffffff, 0x1, 0x0, 0x6, 0x0, 0x525}, r2, 0xf, r2, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r0, 0x0, 0xb, 0xb07, &(0x7f0000001200)="3f00000001000000000000", &(0x7f0000001640)=""/4105, 0x7, 0x0, 0x77, 0xf7, &(0x7f0000001100)="161df9250173fda18edc0a919fcf8b9553d0958ebf3ed8d92cbe2da117563fb70ea0019673ad52ef118c75134b64ce2d9ff6bccf3ca888257e326bb64417c963bfa764db97defd4fd925a4dee450a4a5e3b268001839ecc76688c4c9947745cc2b2135af5e091518bbd9db290efbba4acf0420dcde0c7a", &(0x7f00000000c0)="d25a0f1c33e87c7764894103803bce3e0b29d7135e17227c94b1f0ac50a1f327557d5615bea9afeca39294a716b1c03eb7fdf34dc156356728bb74194145098f628e316b7cdf771dd6bc54051b35ac5714edafa75c02098b0d1ef66f3016ffd8510395aec48a08aa329487632f41f133df6d6df8cb77e868d81b5e6b46321ed6454461e97dac9a9a517e80da813b9b0c2cc788001fee43d0476a37b1274fdce3d9410e", 0x1, 0x101}, 0x48) 11:04:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85200000}, 0x10}, 0x78) 11:04:48 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xffffff85}, 0x10}, 0x78) 11:04:48 executing program 0: socketpair(0xf, 0x3, 0x1af, &(0x7f0000000040)) 11:04:48 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r3, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r4 = openat$cgroup_ro(r1, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r4, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x5, 0x45, 0x0, 0x0, 0xaf508457176c7127, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x40, 0x5}, 0x4100, 0x4000000000000, 0x7, 0x8, 0xbc4a, 0x7fffffff, 0x1, 0x0, 0x6, 0x0, 0x525}, r2, 0xf, r2, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r0, 0x0, 0xb, 0xb07, &(0x7f0000001200)="3f00000001000000000000", &(0x7f0000001640)=""/4105, 0x7, 0x0, 0x77, 0xf7, &(0x7f0000001100)="161df9250173fda18edc0a919fcf8b9553d0958ebf3ed8d92cbe2da117563fb70ea0019673ad52ef118c75134b64ce2d9ff6bccf3ca888257e326bb64417c963bfa764db97defd4fd925a4dee450a4a5e3b268001839ecc76688c4c9947745cc2b2135af5e091518bbd9db290efbba4acf0420dcde0c7a", &(0x7f00000000c0)="d25a0f1c33e87c7764894103803bce3e0b29d7135e17227c94b1f0ac50a1f327557d5615bea9afeca39294a716b1c03eb7fdf34dc156356728bb74194145098f628e316b7cdf771dd6bc54051b35ac5714edafa75c02098b0d1ef66f3016ffd8510395aec48a08aa329487632f41f133df6d6df8cb77e868d81b5e6b46321ed6454461e97dac9a9a517e80da813b9b0c2cc788001fee43d0476a37b1274fdce3d9410e", 0x1, 0x101}, 0x48) 11:04:48 executing program 2: socketpair(0x2, 0x6, 0x52010000, &(0x7f0000000000)) 11:04:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x85ffffff}, 0x10}, 0x78) 11:04:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/1, 0x1}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000440)=""/164, 0xa4}], 0x4, &(0x7f0000000540)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10000) 11:04:48 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r3, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r4 = openat$cgroup_ro(r1, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r4, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x5, 0x45, 0x0, 0x0, 0xaf508457176c7127, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x40, 0x5}, 0x4100, 0x4000000000000, 0x7, 0x8, 0xbc4a, 0x7fffffff, 0x1, 0x0, 0x6, 0x0, 0x525}, r2, 0xf, r2, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r0, 0x0, 0xb, 0xb07, &(0x7f0000001200)="3f00000001000000000000", &(0x7f0000001640)=""/4105, 0x7, 0x0, 0x77, 0xf7, &(0x7f0000001100)="161df9250173fda18edc0a919fcf8b9553d0958ebf3ed8d92cbe2da117563fb70ea0019673ad52ef118c75134b64ce2d9ff6bccf3ca888257e326bb64417c963bfa764db97defd4fd925a4dee450a4a5e3b268001839ecc76688c4c9947745cc2b2135af5e091518bbd9db290efbba4acf0420dcde0c7a", &(0x7f00000000c0)="d25a0f1c33e87c7764894103803bce3e0b29d7135e17227c94b1f0ac50a1f327557d5615bea9afeca39294a716b1c03eb7fdf34dc156356728bb74194145098f628e316b7cdf771dd6bc54051b35ac5714edafa75c02098b0d1ef66f3016ffd8510395aec48a08aa329487632f41f133df6d6df8cb77e868d81b5e6b46321ed6454461e97dac9a9a517e80da813b9b0c2cc788001fee43d0476a37b1274fdce3d9410e", 0x1, 0x101}, 0x48) 11:04:48 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xffffffff}, 0x10}, 0x78) 11:04:48 executing program 0: socketpair(0xf, 0x3, 0x1b0, &(0x7f0000000040)) 11:04:48 executing program 2: socketpair(0x2, 0x6, 0x53000000, &(0x7f0000000000)) 11:04:48 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:48 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r2, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r3 = openat$cgroup_ro(r0, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r3, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x4, 0x5, 0x45, 0x0, 0x0, 0xaf508457176c7127, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x40, 0x5}, 0x4100, 0x4000000000000, 0x7, 0x8, 0xbc4a, 0x7fffffff, 0x1, 0x0, 0x6, 0x0, 0x525}, r1, 0xf, r1, 0x7) 11:04:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) 11:04:48 executing program 0: socketpair(0xf, 0x3, 0x1b1, &(0x7f0000000040)) 11:04:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x90030000}, 0x10}, 0x78) 11:04:48 executing program 2: socketpair(0x2, 0x6, 0x53010000, &(0x7f0000000000)) 11:04:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) 11:04:48 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2}, 0x10}, 0x78) 11:04:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x95020000}, 0x10}, 0x78) 11:04:48 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r1, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r2 = openat$cgroup_ro(r0, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x0, 0x2, 0x2}, 0x40) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001340)='syz0\x00', 0x1ff) 11:04:48 executing program 0: socketpair(0xf, 0x3, 0x1b2, &(0x7f0000000040)) 11:04:48 executing program 2: socketpair(0x2, 0x6, 0x54000000, &(0x7f0000000000)) 11:04:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) 11:04:48 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3}, 0x10}, 0x78) 11:04:48 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r1, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) r2 = openat$cgroup_ro(r0, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x1, 0xc6, 0x62e, 0x7ff, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x0, 0x2, 0x2}, 0x40) 11:04:48 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb5010000}, 0x10}, 0x78) 11:04:48 executing program 2: socketpair(0x2, 0x6, 0x54010000, &(0x7f0000000000)) 11:04:48 executing program 0: socketpair(0xf, 0x3, 0x1b3, &(0x7f0000000040)) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb9030000}, 0x10}, 0x78) 11:04:49 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4}, 0x10}, 0x78) 11:04:49 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r1, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) openat$cgroup_ro(r0, &(0x7f0000001180)='cpuacct.usage_user\x00', 0x0, 0x0) 11:04:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) 11:04:49 executing program 2: socketpair(0x2, 0x6, 0x55000000, &(0x7f0000000000)) 11:04:49 executing program 0: socketpair(0xf, 0x3, 0x1b4, &(0x7f0000000040)) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xcd030000}, 0x10}, 0x78) 11:04:49 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5}, 0x10}, 0x78) 11:04:49 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) 11:04:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) 11:04:49 executing program 2: socketpair(0x2, 0x6, 0x55010000, &(0x7f0000000000)) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xec000000}, 0x10}, 0x78) 11:04:49 executing program 0: socketpair(0xf, 0x3, 0x1b5, &(0x7f0000000040)) 11:04:49 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6}, 0x10}, 0x78) 11:04:49 executing program 2: socketpair(0x2, 0x6, 0x56000000, &(0x7f0000000000)) 11:04:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) 11:04:49 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000012c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xf9030000}, 0x10}, 0x78) 11:04:49 executing program 0: socketpair(0xf, 0x3, 0x1b6, &(0x7f0000000040)) 11:04:49 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7}, 0x10}, 0x78) 11:04:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) 11:04:49 executing program 2: socketpair(0x2, 0x6, 0x56010000, &(0x7f0000000000)) 11:04:49 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfd000000}, 0x10}, 0x78) 11:04:49 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8}, 0x10}, 0x78) 11:04:49 executing program 0: socketpair(0xf, 0x3, 0x1b7, &(0x7f0000000040)) 11:04:49 executing program 2: socketpair(0x2, 0x6, 0x57000000, &(0x7f0000000000)) 11:04:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:49 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfe231a00}, 0x10}, 0x78) 11:04:50 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000000)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa}, 0x10}, 0x78) 11:04:50 executing program 0: socketpair(0xf, 0x3, 0x1b8, &(0x7f0000000040)) 11:04:50 executing program 2: socketpair(0x2, 0x6, 0x57010000, &(0x7f0000000000)) 11:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:50 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xff000000}, 0x10}, 0x78) 11:04:50 executing program 4: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x48}, 0x10}, 0x78) 11:04:50 executing program 0: socketpair(0xf, 0x3, 0x1b9, &(0x7f0000000040)) 11:04:50 executing program 2: socketpair(0x2, 0x6, 0x58000000, &(0x7f0000000000)) 11:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:50 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfff00000}, 0x10}, 0x78) 11:04:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c}, 0x10}, 0x78) 11:04:50 executing program 0: socketpair(0xf, 0x3, 0x1ba, &(0x7f0000000040)) 11:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:50 executing program 2: socketpair(0x2, 0x6, 0x58010000, &(0x7f0000000000)) 11:04:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:50 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfffff000}, 0x10}, 0x78) 11:04:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d}, 0x10}, 0x78) 11:04:50 executing program 0: socketpair(0xf, 0x3, 0x1bb, &(0x7f0000000040)) 11:04:50 executing program 2: socketpair(0x2, 0x6, 0x59000000, &(0x7f0000000000)) 11:04:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:50 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xffffff85}, 0x10}, 0x78) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1bc, &(0x7f0000000040)) 11:04:51 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x68}, 0x10}, 0x78) 11:04:51 executing program 2: socketpair(0x2, 0x6, 0x59010000, &(0x7f0000000000)) 11:04:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x8d, 0xff, 0x1}, 0x20) 11:04:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xffffffff}, 0x10}, 0x78) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1bd, &(0x7f0000000040)) 11:04:51 executing program 2: socketpair(0x2, 0x6, 0x5a000000, &(0x7f0000000000)) 11:04:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:51 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c}, 0x10}, 0x78) 11:04:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x81, 0xff, 0x1}, 0x20) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1be, &(0x7f0000000040)) 11:04:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:51 executing program 2: socketpair(0x2, 0x6, 0x5a010000, &(0x7f0000000000)) 11:04:51 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x74}, 0x10}, 0x78) 11:04:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1bf, &(0x7f0000000040)) 11:04:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2}, 0x10}, 0x78) 11:04:51 executing program 2: socketpair(0x2, 0x6, 0x5b000000, &(0x7f0000000000)) 11:04:51 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a}, 0x10}, 0x78) 11:04:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1c0, &(0x7f0000000040)) 11:04:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3}, 0x10}, 0x78) 11:04:51 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85}, 0x10}, 0x78) 11:04:51 executing program 2: socketpair(0x2, 0x6, 0x5b010000, &(0x7f0000000000)) 11:04:51 executing program 0: socketpair(0xf, 0x3, 0x1c1, &(0x7f0000000040)) 11:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:52 executing program 2: socketpair(0x2, 0x6, 0x5c000000, &(0x7f0000000000)) 11:04:52 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4}, 0x10}, 0x78) 11:04:52 executing program 0: socketpair(0xf, 0x3, 0x1c2, &(0x7f0000000040)) 11:04:52 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec}, 0x10}, 0x78) 11:04:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:52 executing program 2: socketpair(0x2, 0x6, 0x5c010000, &(0x7f0000000000)) 11:04:52 executing program 0: socketpair(0xf, 0x3, 0x1c3, &(0x7f0000000040)) 11:04:52 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5}, 0x10}, 0x78) 11:04:52 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0}, 0x10}, 0x78) 11:04:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:52 executing program 2: socketpair(0x2, 0x6, 0x5d000000, &(0x7f0000000000)) 11:04:52 executing program 0: socketpair(0xf, 0x3, 0x1c4, &(0x7f0000000040)) 11:04:52 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6}, 0x10}, 0x78) 11:04:52 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd}, 0x10}, 0x78) 11:04:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:52 executing program 2: socketpair(0x2, 0x6, 0x5d010000, &(0x7f0000000000)) 11:04:52 executing program 0: socketpair(0xf, 0x3, 0x1c5, &(0x7f0000000040)) 11:04:52 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x179}, 0x10}, 0x78) 11:04:52 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7}, 0x10}, 0x78) 11:04:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:52 executing program 2: socketpair(0x2, 0x6, 0x5e000000, &(0x7f0000000000)) 11:04:53 executing program 0: socketpair(0xf, 0x3, 0x1c6, &(0x7f0000000040)) 11:04:53 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8}, 0x10}, 0x78) 11:04:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1b5}, 0x10}, 0x78) 11:04:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x2, 0x7, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x61, 0xff, 0x1}, 0x20) 11:04:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x1, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:53 executing program 2: socketpair(0x2, 0x6, 0x5e010000, &(0x7f0000000000)) 11:04:53 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa}, 0x10}, 0x78) 11:04:53 executing program 0: socketpair(0xf, 0x3, 0x1c7, &(0x7f0000000040)) 11:04:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x295}, 0x10}, 0x78) 11:04:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@enum={0x2, 0x6, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x59, 0xff, 0x1}, 0x20) 11:04:53 executing program 2: socketpair(0x2, 0x6, 0x5f000000, &(0x7f0000000000)) 11:04:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x0, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:53 executing program 0: socketpair(0xf, 0x3, 0x1c8, &(0x7f0000000040)) 11:04:53 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x48}, 0x10}, 0x78) 11:04:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x300}, 0x10}, 0x78) 11:04:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x0, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:53 executing program 2: socketpair(0x2, 0x6, 0x5f010000, &(0x7f0000000000)) 11:04:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x2, 0x5, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x51, 0xff, 0x1}, 0x20) 11:04:53 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c}, 0x10}, 0x78) 11:04:53 executing program 0: socketpair(0xf, 0x3, 0x1c9, &(0x7f0000000040)) 11:04:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x32d}, 0x10}, 0x78) 11:04:53 executing program 2: socketpair(0x2, 0x6, 0x60000000, &(0x7f0000000000)) 11:04:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x0, 0xff}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@enum={0x2, 0x4, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x49, 0xff, 0x1}, 0x20) 11:04:53 executing program 0: socketpair(0xf, 0x3, 0x1ca, &(0x7f0000000040)) 11:04:53 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d}, 0x10}, 0x78) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x60010000, &(0x7f0000000000)) 11:04:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x351}, 0x10}, 0x78) 11:04:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x35, 0xff, 0x1}, 0x20) 11:04:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x2, 0x3, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x41, 0xff, 0x1}, 0x20) 11:04:54 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x68}, 0x10}, 0x78) 11:04:54 executing program 0: socketpair(0xf, 0x3, 0x1cb, &(0x7f0000000040)) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x61000000, &(0x7f0000000000)) 11:04:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x390}, 0x10}, 0x78) 11:04:54 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c}, 0x10}, 0x78) 11:04:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x39, 0xff, 0x1}, 0x20) 11:04:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x34, 0xff, 0x1}, 0x20) 11:04:54 executing program 0: socketpair(0xf, 0x3, 0x1cc, &(0x7f0000000040)) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x61010000, &(0x7f0000000000)) 11:04:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x10, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:04:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3b9}, 0x10}, 0x78) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x62000000, &(0x7f0000000000)) 11:04:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x33, 0xff, 0x1}, 0x20) 11:04:54 executing program 0: socketpair(0xf, 0x3, 0x1cd, &(0x7f0000000040)) 11:04:54 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x74}, 0x10}, 0x78) 11:04:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:04:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3cd}, 0x10}, 0x78) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x62010000, &(0x7f0000000000)) 11:04:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f0000001440)=""/255, 0x32, 0xff, 0x1}, 0x20) 11:04:54 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a}, 0x10}, 0x78) 11:04:54 executing program 0: socketpair(0xf, 0x3, 0x1ce, &(0x7f0000000040)) 11:04:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) 11:04:54 executing program 2: socketpair(0x2, 0x6, 0x63000000, &(0x7f0000000000)) 11:04:54 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3f9}, 0x10}, 0x78) 11:04:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:04:55 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85}, 0x10}, 0x78) 11:04:55 executing program 0: socketpair(0xf, 0x3, 0x1cf, &(0x7f0000000040)) 11:04:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x27, 0xff, 0x1}, 0x20) 11:04:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:04:55 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x500}, 0x10}, 0x78) 11:04:55 executing program 2: socketpair(0x2, 0x6, 0x63010000, &(0x7f0000000000)) 11:04:55 executing program 0: socketpair(0xf, 0x3, 0x1d0, &(0x7f0000000040)) 11:04:55 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec}, 0x10}, 0x78) 11:04:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2}]}}, &(0x7f0000001440)=""/255, 0x26, 0xff, 0x1}, 0x20) 11:04:55 executing program 2: socketpair(0x2, 0x6, 0x64000000, &(0x7f0000000000)) 11:04:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:04:55 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x600}, 0x10}, 0x78) 11:04:55 executing program 0: socketpair(0xf, 0x3, 0x1d1, &(0x7f0000000040)) 11:04:55 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0}, 0x10}, 0x78) 11:04:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2}]}}, &(0x7f0000001440)=""/255, 0x26, 0xff, 0x1}, 0x20) 11:04:55 executing program 2: socketpair(0x2, 0x6, 0x64010000, &(0x7f0000000000)) 11:04:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f0000001440)=""/255, 0x32, 0xff}, 0x20) 11:04:55 executing program 0: socketpair(0xf, 0x3, 0x1d2, &(0x7f0000000040)) 11:04:55 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd}, 0x10}, 0x78) 11:04:55 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x700}, 0x10}, 0x78) 11:04:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x2}]}}, &(0x7f0000001440)=""/255, 0x26, 0xff, 0x1}, 0x20) 11:04:55 executing program 2: socketpair(0x2, 0x6, 0x65000000, &(0x7f0000000000)) 11:04:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f0000001440)=""/255, 0x32, 0xff}, 0x20) 11:04:55 executing program 0: socketpair(0xf, 0x3, 0x1d3, &(0x7f0000000040)) 11:04:55 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa00}, 0x10}, 0x78) 11:04:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:04:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x179}, 0x10}, 0x78) 11:04:56 executing program 0: socketpair(0xf, 0x3, 0x1d4, &(0x7f0000000040)) 11:04:56 executing program 2: socketpair(0x2, 0x6, 0x65010000, &(0x7f0000000000)) 11:04:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}}, &(0x7f0000001440)=""/255, 0x32, 0xff}, 0x20) 11:04:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1085}, 0x10}, 0x78) 11:04:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:04:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1b5}, 0x10}, 0x78) 11:04:56 executing program 0: socketpair(0xf, 0x3, 0x1d5, &(0x7f0000000040)) 11:04:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:56 executing program 2: socketpair(0x2, 0x6, 0x66000000, &(0x7f0000000000)) 11:04:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1840}, 0x10}, 0x78) 11:04:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:04:56 executing program 0: socketpair(0xf, 0x3, 0x1d6, &(0x7f0000000040)) 11:04:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x295}, 0x10}, 0x78) 11:04:56 executing program 2: socketpair(0x2, 0x6, 0x66010000, &(0x7f0000000000)) 11:04:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1f00}, 0x10}, 0x78) 11:04:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x27, 0xff}, 0x20) 11:04:56 executing program 0: socketpair(0xf, 0x3, 0x1d7, &(0x7f0000000040)) 11:04:56 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x300}, 0x10}, 0x78) 11:04:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@enum={0x0, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x69, 0xff, 0x1}, 0x20) 11:04:56 executing program 2: socketpair(0x2, 0x6, 0x67000000, &(0x7f0000000000)) 11:04:56 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2000}, 0x10}, 0x78) 11:04:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x27, 0xff}, 0x20) 11:04:56 executing program 0: socketpair(0xf, 0x3, 0x1d8, &(0x7f0000000040)) 11:04:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x32d}, 0x10}, 0x78) 11:04:57 executing program 2: socketpair(0x2, 0x6, 0x67010000, &(0x7f0000000000)) 11:04:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2085}, 0x10}, 0x78) 11:04:57 executing program 0: socketpair(0xf, 0x3, 0x1d9, &(0x7f0000000040)) 11:04:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum={0x2}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x27, 0xff}, 0x20) 11:04:57 executing program 2: socketpair(0x2, 0x6, 0x68000000, &(0x7f0000000000)) 11:04:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x351}, 0x10}, 0x78) 11:04:57 executing program 0: socketpair(0xf, 0x3, 0x1da, &(0x7f0000000040)) 11:04:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2d03}, 0x10}, 0x78) 11:04:57 executing program 5: socketpair(0x2, 0x6, 0x67010000, &(0x7f0000000000)) 11:04:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x390}, 0x10}, 0x78) 11:04:57 executing program 2: socketpair(0x2, 0x6, 0x68010000, &(0x7f0000000000)) 11:04:57 executing program 0: socketpair(0xf, 0x3, 0x1db, &(0x7f0000000040)) 11:04:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:04:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3b9}, 0x10}, 0x78) 11:04:57 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0}, 0x10}, 0x78) 11:04:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4018}, 0x10}, 0x78) 11:04:57 executing program 2: socketpair(0x2, 0x6, 0x69000000, &(0x7f0000000000)) 11:04:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:57 executing program 0: socketpair(0xf, 0x3, 0x1dc, &(0x7f0000000040)) 11:04:57 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3cd}, 0x10}, 0x78) 11:04:57 executing program 2: socketpair(0x2, 0x6, 0x69010000, &(0x7f0000000000)) 11:04:57 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5}, 0x10}, 0x78) 11:04:57 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4800}, 0x10}, 0x78) 11:04:57 executing program 0: socketpair(0xf, 0x3, 0x1dd, &(0x7f0000000040)) 11:04:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3f9}, 0x10}, 0x78) 11:04:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c00}, 0x10}, 0x78) 11:04:58 executing program 2: socketpair(0x2, 0x6, 0x6a000000, &(0x7f0000000000)) 11:04:58 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a}, 0x10}, 0x78) 11:04:58 executing program 0: socketpair(0xf, 0x3, 0x1de, &(0x7f0000000040)) 11:04:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:04:58 executing program 2: socketpair(0x2, 0x6, 0x6a010000, &(0x7f0000000000)) 11:04:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x500}, 0x10}, 0x78) 11:04:58 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xfe231a00}, 0x10}, 0x78) 11:04:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5103}, 0x10}, 0x78) 11:04:58 executing program 0: socketpair(0xf, 0x3, 0x1df, &(0x7f0000000040)) 11:04:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:58 executing program 2: socketpair(0x2, 0x6, 0x6b000000, &(0x7f0000000000)) 11:04:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d00}, 0x10}, 0x78) 11:04:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x600}, 0x10}, 0x78) 11:04:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@enum={0x2, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}, {0x8006, 0xffffd4fc}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x7, 0x8}}, @const={0x7}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x99, 0xff, 0x1}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000009c0)={&(0x7f0000000980)=""/3, 0x3}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5}}, @typedef={0x3, 0x0, 0x0, 0x8, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @union={0x2, 0x0, 0x0, 0x5, 0x0, 0x7ffd}]}, {0x0, [0x5f, 0x5f, 0x30, 0x0, 0x5f, 0x2e, 0x5f]}}, &(0x7f0000000740)=""/135, 0x69, 0x87}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffb}, 0xc) 11:04:58 executing program 0: socketpair(0xf, 0x3, 0x1e0, &(0x7f0000000040)) 11:04:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:58 executing program 2: socketpair(0x2, 0x6, 0x6b010000, &(0x7f0000000000)) 11:04:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6800}, 0x10}, 0x78) 11:04:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x700}, 0x10}, 0x78) 11:04:58 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xffffff85}, 0x10}, 0x78) 11:04:58 executing program 0: socketpair(0xf, 0x3, 0x1e1, &(0x7f0000000040)) 11:04:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:04:58 executing program 2: socketpair(0x2, 0x6, 0x6c000000, &(0x7f0000000000)) 11:04:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c00}, 0x10}, 0x78) 11:04:58 executing program 0: socketpair(0xf, 0x3, 0x1e2, &(0x7f0000000040)) 11:04:58 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa00}, 0x10}, 0x78) 11:04:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x700}, 0x10}, 0x78) 11:04:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x5, [@enum={0x0, 0x7, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}, {0x3, 0x800}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x61, 0xff, 0x1}, 0x20) 11:04:59 executing program 0: socketpair(0xf, 0x3, 0x1e3, &(0x7f0000000040)) 11:04:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7400}, 0x10}, 0x78) 11:04:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1085}, 0x10}, 0x78) 11:04:59 executing program 2: socketpair(0x2, 0x6, 0x6c010000, &(0x7f0000000000)) 11:04:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@enum={0x0, 0x6, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}, {0x7, 0x7f}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x59, 0xff, 0x1}, 0x20) 11:04:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa00}, 0x10}, 0x78) 11:04:59 executing program 0: socketpair(0xf, 0x3, 0x1e4, &(0x7f0000000040)) 11:04:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7901}, 0x10}, 0x78) 11:04:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x0, 0x5, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}, {0xd, 0xbd5}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x51, 0xff, 0x1}, 0x20) 11:04:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1840}, 0x10}, 0x78) 11:04:59 executing program 2: socketpair(0x2, 0x6, 0x6d000000, &(0x7f0000000000)) 11:04:59 executing program 5: socketpair(0x11, 0x3, 0xc6000000, &(0x7f0000000000)) 11:04:59 executing program 0: socketpair(0xf, 0x3, 0x1e5, &(0x7f0000000040)) 11:04:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a00}, 0x10}, 0x78) 11:04:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}, {0xa, 0x9}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x49, 0xff, 0x1}, 0x20) 11:04:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1f00}, 0x10}, 0x78) 11:04:59 executing program 2: socketpair(0x2, 0x6, 0x6d010000, &(0x7f0000000000)) 11:04:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xb9030000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:59 executing program 0: socketpair(0xf, 0x3, 0x1e6, &(0x7f0000000040)) 11:04:59 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8100}, 0x10}, 0x78) 11:04:59 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2000}, 0x10}, 0x78) 11:04:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@enum={0x0, 0x3, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}, {0x5, 0x800}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x41, 0xff, 0x1}, 0x20) 11:04:59 executing program 0: socketpair(0xf, 0x3, 0x1e7, &(0x7f0000000040)) 11:04:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x68000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:04:59 executing program 2: socketpair(0x2, 0x6, 0x6e000000, &(0x7f0000000000)) 11:05:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8500}, 0x10}, 0x78) 11:05:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x10, 0x587}, {0xe, 0x2a74}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x39, 0xff, 0x1}, 0x20) 11:05:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2085}, 0x10}, 0x78) 11:05:00 executing program 0: socketpair(0xf, 0x3, 0x1e8, &(0x7f0000000040)) 11:05:00 executing program 2: socketpair(0x2, 0x6, 0x6e010000, &(0x7f0000000000)) 11:05:00 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x85000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8510}, 0x10}, 0x78) 11:05:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:00 executing program 2: socketpair(0x2, 0x6, 0x6f000000, &(0x7f0000000000)) 11:05:00 executing program 0: socketpair(0xf, 0x3, 0x1e9, &(0x7f0000000040)) 11:05:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2d03}, 0x10}, 0x78) 11:05:00 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x2d030000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8520}, 0x10}, 0x78) 11:05:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:00 executing program 0: socketpair(0xf, 0x3, 0x1ea, &(0x7f0000000040)) 11:05:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4018}, 0x10}, 0x78) 11:05:00 executing program 2: socketpair(0x2, 0x6, 0x6f010000, &(0x7f0000000000)) 11:05:00 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8510}, 0x10}, 0x78) 11:05:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x9003}, 0x10}, 0x78) 11:05:00 executing program 2: socketpair(0x2, 0x6, 0x70000000, &(0x7f0000000000)) 11:05:00 executing program 0: socketpair(0xf, 0x3, 0x1eb, &(0x7f0000000040)) 11:05:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4800}, 0x10}, 0x78) 11:05:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:00 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x9502}, 0x10}, 0x78) 11:05:00 executing program 0: socketpair(0xf, 0x3, 0x1ec, &(0x7f0000000040)) 11:05:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:00 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c00}, 0x10}, 0x78) 11:05:01 executing program 2: socketpair(0x2, 0x6, 0x70010000, &(0x7f0000000000)) 11:05:01 executing program 0: socketpair(0xf, 0x3, 0x1ed, &(0x7f0000000040)) 11:05:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb501}, 0x10}, 0x78) 11:05:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5103}, 0x10}, 0x78) 11:05:01 executing program 2: socketpair(0x2, 0x6, 0x71000000, &(0x7f0000000000)) 11:05:01 executing program 0: socketpair(0xf, 0x3, 0x1ee, &(0x7f0000000040)) 11:05:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb903}, 0x10}, 0x78) 11:05:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d00}, 0x10}, 0x78) 11:05:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:01 executing program 2: socketpair(0x2, 0x6, 0x71010000, &(0x7f0000000000)) 11:05:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xcd03}, 0x10}, 0x78) 11:05:01 executing program 0: socketpair(0xf, 0x3, 0x1ef, &(0x7f0000000040)) 11:05:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec00}, 0x10}, 0x78) 11:05:01 executing program 2: socketpair(0x2, 0x6, 0x72000000, &(0x7f0000000000)) 11:05:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6800}, 0x10}, 0x78) 11:05:01 executing program 0: socketpair(0xf, 0x3, 0x1f0, &(0x7f0000000040)) 11:05:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:01 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf000}, 0x10}, 0x78) 11:05:01 executing program 2: socketpair(0x2, 0x6, 0x72010000, &(0x7f0000000000)) 11:05:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:01 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c00}, 0x10}, 0x78) 11:05:01 executing program 0: socketpair(0xf, 0x3, 0x1f1, &(0x7f0000000040)) 11:05:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:02 executing program 2: socketpair(0x2, 0x6, 0x73000000, &(0x7f0000000000)) 11:05:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ff}, 0x10}, 0x78) 11:05:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x30, 0xff, 0x1}, 0x20) 11:05:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7400}, 0x10}, 0x78) 11:05:02 executing program 0: socketpair(0xf, 0x3, 0x1f2, &(0x7f0000000040)) 11:05:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:02 executing program 2: socketpair(0x2, 0x6, 0x73010000, &(0x7f0000000000)) 11:05:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf903}, 0x10}, 0x78) 11:05:02 executing program 0: socketpair(0xf, 0x3, 0x1f3, &(0x7f0000000040)) 11:05:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x2f, 0xff, 0x1}, 0x20) 11:05:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7901}, 0x10}, 0x78) 11:05:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:02 executing program 2: socketpair(0x2, 0x6, 0x74000000, &(0x7f0000000000)) 11:05:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd00}, 0x10}, 0x78) 11:05:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:02 executing program 0: socketpair(0xf, 0x3, 0x1f4, &(0x7f0000000040)) [ 2466.891230][ T3251] ieee802154 phy0 wpan0: encryption failed: -22 [ 2466.897552][ T3251] ieee802154 phy1 wpan1: encryption failed: -22 11:05:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a00}, 0x10}, 0x78) 11:05:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:02 executing program 2: socketpair(0x2, 0x6, 0x74010000, &(0x7f0000000000)) 11:05:02 executing program 0: socketpair(0xf, 0x3, 0x1f5, &(0x7f0000000040)) 11:05:02 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8100}, 0x10}, 0x78) 11:05:02 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xff00}, 0x10}, 0x78) 11:05:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:02 executing program 2: socketpair(0x2, 0x6, 0x75000000, &(0x7f0000000000)) 11:05:03 executing program 0: socketpair(0xf, 0x3, 0x1f6, &(0x7f0000000040)) 11:05:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1a23fe}, 0x10}, 0x78) 11:05:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8500}, 0x10}, 0x78) 11:05:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:03 executing program 2: socketpair(0x2, 0x6, 0x75010000, &(0x7f0000000000)) 11:05:03 executing program 0: socketpair(0xf, 0x3, 0x1f7, &(0x7f0000000040)) 11:05:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x28, 0xff, 0x1}, 0x20) 11:05:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8510}, 0x10}, 0x78) 11:05:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x200000}, 0x10}, 0x78) 11:05:03 executing program 2: socketpair(0x2, 0x6, 0x76000000, &(0x7f0000000000)) 11:05:03 executing program 0: socketpair(0xf, 0x3, 0x1f8, &(0x7f0000000040)) 11:05:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8520}, 0x10}, 0x78) 11:05:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@enum]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x27, 0xff, 0x1}, 0x20) 11:05:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ffff}, 0x10}, 0x78) 11:05:03 executing program 0: socketpair(0xf, 0x3, 0x1f9, &(0x7f0000000040)) 11:05:03 executing program 2: socketpair(0x2, 0x6, 0x76010000, &(0x7f0000000000)) 11:05:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x10}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:03 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x9003}, 0x10}, 0x78) 11:05:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001440)=""/255, 0x26, 0xff, 0x1}, 0x20) 11:05:03 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1000000}, 0x10}, 0x78) 11:05:03 executing program 0: socketpair(0xf, 0x3, 0x1fa, &(0x7f0000000040)) 11:05:03 executing program 2: socketpair(0x2, 0x6, 0x77000000, &(0x7f0000000000)) 11:05:04 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ffff}, 0x10}, 0x78) 11:05:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x9502}, 0x10}, 0x78) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2000000}, 0x10}, 0x78) 11:05:04 executing program 0: socketpair(0xf, 0x3, 0x1fb, &(0x7f0000000040)) 11:05:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3000000}, 0x10}, 0x78) 11:05:04 executing program 2: socketpair(0x2, 0x6, 0x77010000, &(0x7f0000000000)) 11:05:04 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb903}, 0x10}, 0x78) 11:05:04 executing program 0: socketpair(0xf, 0x3, 0x1fc, &(0x7f0000000040)) 11:05:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb501}, 0x10}, 0x78) 11:05:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4000000}, 0x10}, 0x78) 11:05:04 executing program 2: socketpair(0x2, 0x6, 0x78000000, &(0x7f0000000000)) 11:05:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:04 executing program 0: socketpair(0xf, 0x3, 0x1fd, &(0x7f0000000040)) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5000000}, 0x10}, 0x78) 11:05:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:05:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb903}, 0x10}, 0x78) 11:05:04 executing program 2: socketpair(0x2, 0x6, 0x78010000, &(0x7f0000000000)) 11:05:04 executing program 0: socketpair(0xf, 0x3, 0x1fe, &(0x7f0000000040)) 11:05:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001440)=""/255, 0x26, 0xff}, 0x20) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:04 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xcd03}, 0x10}, 0x78) 11:05:04 executing program 2: socketpair(0x2, 0x6, 0x79000000, &(0x7f0000000000)) 11:05:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x587}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:04 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7000000}, 0x10}, 0x78) 11:05:04 executing program 0: socketpair(0xf, 0x3, 0x201, &(0x7f0000000040)) 11:05:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001440)=""/255, 0x26, 0xff}, 0x20) 11:05:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec00}, 0x10}, 0x78) 11:05:05 executing program 2: socketpair(0x2, 0x6, 0x79010000, &(0x7f0000000000)) 11:05:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001440)=""/255, 0x26, 0xff}, 0x20) 11:05:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:05 executing program 0: socketpair(0xf, 0x3, 0x300, &(0x7f0000000040)) 11:05:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8000000}, 0x10}, 0x78) 11:05:05 executing program 2: socketpair(0x2, 0x6, 0x7a000000, &(0x7f0000000000)) 11:05:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf000}, 0x10}, 0x78) 11:05:05 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:05 executing program 0: socketpair(0xf, 0x3, 0x301, &(0x7f0000000040)) 11:05:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa000000}, 0x10}, 0x78) 11:05:05 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb501}, 0x10}, 0x78) 11:05:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ff}, 0x10}, 0x78) 11:05:05 executing program 2: socketpair(0x2, 0x6, 0x7a010000, &(0x7f0000000000)) 11:05:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:05:05 executing program 0: socketpair(0xf, 0x3, 0x500, &(0x7f0000000040)) 11:05:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x18400000}, 0x10}, 0x78) 11:05:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf903}, 0x10}, 0x78) 11:05:05 executing program 2: socketpair(0x2, 0x6, 0x7b000000, &(0x7f0000000000)) 11:05:05 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ff}, 0x10}, 0x78) 11:05:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:05 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd00}, 0x10}, 0x78) 11:05:05 executing program 0: socketpair(0xf, 0x3, 0x501, &(0x7f0000000040)) 11:05:05 executing program 2: socketpair(0x2, 0x6, 0x7b010000, &(0x7f0000000000)) 11:05:05 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4800}, 0x10}, 0x78) 11:05:05 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1f000000}, 0x10}, 0x78) 11:05:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xff00}, 0x10}, 0x78) 11:05:06 executing program 0: socketpair(0xf, 0x3, 0x600, &(0x7f0000000040)) 11:05:06 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x68000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:06 executing program 2: socketpair(0x2, 0x6, 0x7c000000, &(0x7f0000000000)) 11:05:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2d030000}, 0x10}, 0x78) 11:05:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={0x0, &(0x7f0000001440)=""/255, 0x0, 0xff, 0x1}, 0x20) 11:05:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1a23fe}, 0x10}, 0x78) 11:05:06 executing program 0: socketpair(0xf, 0x3, 0x601, &(0x7f0000000040)) 11:05:06 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x18400000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:06 executing program 2: socketpair(0x2, 0x6, 0x7c010000, &(0x7f0000000000)) 11:05:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x48000000}, 0x10}, 0x78) 11:05:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x200000}, 0x10}, 0x78) 11:05:06 executing program 0: socketpair(0xf, 0x3, 0x700, &(0x7f0000000040)) 11:05:06 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xa000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:06 executing program 2: socketpair(0x2, 0x6, 0x7d000000, &(0x7f0000000000)) 11:05:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c000000}, 0x10}, 0x78) 11:05:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf0ffff}, 0x10}, 0x78) 11:05:06 executing program 5: socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:06 executing program 0: socketpair(0xf, 0x3, 0x701, &(0x7f0000000040)) 11:05:06 executing program 2: socketpair(0x2, 0x6, 0x7d010000, &(0x7f0000000000)) 11:05:06 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x51030000}, 0x10}, 0x78) 11:05:06 executing program 5: socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:06 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1000000}, 0x10}, 0x78) 11:05:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x1d, 0xff, 0x1}, 0x20) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x7e000000, &(0x7f0000000000)) 11:05:07 executing program 0: socketpair(0xf, 0x3, 0x801, &(0x7f0000000040)) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d000000}, 0x10}, 0x78) 11:05:07 executing program 5: socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2000000}, 0x10}, 0x78) 11:05:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x7e010000, &(0x7f0000000000)) 11:05:07 executing program 0: socketpair(0xf, 0x3, 0x900, &(0x7f0000000040)) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x68000000}, 0x10}, 0x78) 11:05:07 executing program 5: socketpair(0x0, 0x3, 0x2, &(0x7f0000000040)) 11:05:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x3000000}, 0x10}, 0x78) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x7f000000, &(0x7f0000000000)) 11:05:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:07 executing program 0: socketpair(0xf, 0x3, 0x901, &(0x7f0000000040)) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c000000}, 0x10}, 0x78) 11:05:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4000000}, 0x10}, 0x78) 11:05:07 executing program 5: socketpair(0x0, 0x3, 0x2, &(0x7f0000000040)) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x74000000}, 0x10}, 0x78) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x7f010000, &(0x7f0000000000)) 11:05:07 executing program 0: socketpair(0xf, 0x3, 0xa00, &(0x7f0000000040)) 11:05:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) 11:05:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5000000}, 0x10}, 0x78) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x79010000}, 0x10}, 0x78) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x80010000, &(0x7f0000000000)) 11:05:07 executing program 5: socketpair(0x0, 0x3, 0x2, &(0x7f0000000040)) 11:05:07 executing program 0: socketpair(0xf, 0x3, 0xa01, &(0x7f0000000040)) 11:05:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x31, 0xff, 0x1}, 0x20) 11:05:07 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:07 executing program 2: socketpair(0x2, 0x6, 0x81000000, &(0x7f0000000000)) 11:05:07 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a000000}, 0x10}, 0x78) 11:05:08 executing program 5: socketpair(0xf, 0x0, 0x2, &(0x7f0000000040)) 11:05:08 executing program 0: socketpair(0xf, 0x3, 0xb00, &(0x7f0000000040)) 11:05:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001440)=""/255, 0x30, 0xff, 0x1}, 0x20) 11:05:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7000000}, 0x10}, 0x78) 11:05:08 executing program 2: socketpair(0x2, 0x6, 0x81010000, &(0x7f0000000000)) 11:05:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x8000000}, 0x10}, 0x78) 11:05:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000001440)=""/255, 0x2f, 0xff, 0x1}, 0x20) 11:05:08 executing program 5: socketpair(0xf, 0x0, 0x2, &(0x7f0000000040)) 11:05:08 executing program 0: socketpair(0xf, 0x3, 0xb01, &(0x7f0000000040)) 11:05:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x81000000}, 0x10}, 0x78) 11:05:08 executing program 2: socketpair(0x2, 0x6, 0x82000000, &(0x7f0000000000)) 11:05:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85000000}, 0x10}, 0x78) 11:05:08 executing program 0: socketpair(0xf, 0x3, 0xc00, &(0x7f0000000040)) 11:05:08 executing program 5: socketpair(0xf, 0x0, 0x2, &(0x7f0000000040)) 11:05:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xa000000}, 0x10}, 0x78) 11:05:08 executing program 2: socketpair(0x2, 0x6, 0x82010000, &(0x7f0000000000)) 11:05:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85100000}, 0x10}, 0x78) 11:05:08 executing program 0: socketpair(0xf, 0x3, 0xc01, &(0x7f0000000040)) 11:05:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x18400000}, 0x10}, 0x78) 11:05:08 executing program 5: socketpair(0xf, 0x3, 0x0, &(0x7f0000000040)) 11:05:08 executing program 2: socketpair(0x2, 0x6, 0x83000000, &(0x7f0000000000)) 11:05:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:08 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85200000}, 0x10}, 0x78) 11:05:08 executing program 0: socketpair(0xf, 0x3, 0xd00, &(0x7f0000000040)) 11:05:08 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x1f000000}, 0x10}, 0x78) 11:05:08 executing program 5: socketpair(0xf, 0x3, 0x0, &(0x7f0000000040)) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0xd01, &(0x7f0000000040)) 11:05:09 executing program 2: socketpair(0x2, 0x6, 0x83010000, &(0x7f0000000000)) 11:05:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 11:05:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85ffffff}, 0x10}, 0x78) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x2d030000}, 0x10}, 0x78) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0xe00, &(0x7f0000000040)) 11:05:09 executing program 5: socketpair(0xf, 0x3, 0x0, &(0x7f0000000040)) 11:05:09 executing program 2: socketpair(0x2, 0x6, 0x84000000, &(0x7f0000000000)) 11:05:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x90030000}, 0x10}, 0x78) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x48000000}, 0x10}, 0x78) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0xe01, &(0x7f0000000040)) 11:05:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:09 executing program 5: socketpair(0xf, 0x3, 0x2, 0x0) 11:05:09 executing program 2: socketpair(0x2, 0x6, 0x84010000, &(0x7f0000000000)) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x4c000000}, 0x10}, 0x78) 11:05:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x95020000}, 0x10}, 0x78) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0xf00, &(0x7f0000000040)) 11:05:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:09 executing program 5: socketpair(0xf, 0x3, 0x2, 0x0) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x51030000}, 0x10}, 0x78) 11:05:09 executing program 2: socketpair(0x2, 0x6, 0x85000000, &(0x7f0000000000)) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0xf01, &(0x7f0000000040)) 11:05:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb5010000}, 0x10}, 0x78) 11:05:09 executing program 5: socketpair(0xf, 0x3, 0x2, 0x0) 11:05:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff}, 0x20) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x5d000000}, 0x10}, 0x78) 11:05:09 executing program 2: socketpair(0x2, 0x6, 0x85010000, &(0x7f0000000000)) 11:05:09 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x90030000}, 0x10}, 0x78) 11:05:09 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x48000000}, 0x10}, 0x78) 11:05:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb9030000}, 0x10}, 0x78) 11:05:09 executing program 0: socketpair(0xf, 0x3, 0x1001, &(0x7f0000000040)) 11:05:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x68000000}, 0x10}, 0x78) 11:05:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xcd030000}, 0x10}, 0x78) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x86000000, &(0x7f0000000000)) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x81000000}, 0x10}, 0x78) 11:05:10 executing program 0: socketpair(0xf, 0x3, 0x1100, &(0x7f0000000040)) 11:05:10 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x6c000000}, 0x10}, 0x78) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x86010000, &(0x7f0000000000)) 11:05:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec000000}, 0x10}, 0x78) 11:05:10 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x79010000}, 0x10}, 0x78) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x8000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 0: socketpair(0xf, 0x3, 0x1101, &(0x7f0000000040)) 11:05:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x74000000}, 0x10}, 0x78) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x87000000, &(0x7f0000000000)) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x3000000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 5: socketpair(0x11, 0x3, 0xba000000, &(0x7f0000000000)) 11:05:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf9030000}, 0x10}, 0x78) 11:05:10 executing program 0: socketpair(0xf, 0x3, 0x1200, &(0x7f0000000040)) 11:05:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x79010000}, 0x10}, 0x78) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x87010000, &(0x7f0000000000)) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xf903, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xf000, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd000000}, 0x10}, 0x78) 11:05:10 executing program 0: socketpair(0xf, 0x3, 0x1201, &(0x7f0000000040)) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x1a23fe, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x88000000, &(0x7f0000000000)) 11:05:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x7a000000}, 0x10}, 0x78) 11:05:10 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x8520, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfe231a00}, 0x10}, 0x78) 11:05:10 executing program 0: socketpair(0xf, 0x3, 0x1300, &(0x7f0000000040)) 11:05:10 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0xcd03, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x81000000}, 0x10}, 0x78) 11:05:10 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:10 executing program 2: socketpair(0x2, 0x6, 0x88010000, &(0x7f0000000000)) 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xff000000}, 0x10}, 0x78) [ 2475.337367][T23452] FAULT_INJECTION: forcing a failure. [ 2475.337367][T23452] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:05:11 executing program 0: socketpair(0xf, 0x3, 0x1301, &(0x7f0000000040)) [ 2475.380506][T23452] CPU: 1 PID: 23452 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2475.388957][T23452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2475.399020][T23452] Call Trace: [ 2475.402313][T23452] dump_stack_lvl+0xcd/0x134 [ 2475.406924][T23452] should_fail.cold+0x5/0xa [ 2475.411458][T23452] _copy_from_user+0x2c/0x180 [ 2475.416157][T23452] __sys_bpf+0x311/0x5df0 [ 2475.420534][T23452] ? bpf_link_get_from_fd+0x110/0x110 [ 2475.425930][T23452] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2475.431926][T23452] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2475.437917][T23452] ? find_held_lock+0x2d/0x110 [ 2475.442694][T23452] ? trace_hardirqs_on+0x38/0x1c0 [ 2475.447724][T23452] __x64_sys_bpf+0x75/0xb0 [ 2475.452146][T23452] ? syscall_enter_from_user_mode+0x21/0x70 [ 2475.458045][T23452] do_syscall_64+0x35/0xb0 [ 2475.462473][T23452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2475.468371][T23452] RIP: 0033:0x4665f9 [ 2475.472260][T23452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2475.491869][T23452] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2475.500281][T23452] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2475.508242][T23452] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2475.516208][T23452] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:11 executing program 2: socketpair(0x2, 0x6, 0x89000000, &(0x7f0000000000)) 11:05:11 executing program 4 (fault-call:0 fault-nth:0): socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85000000}, 0x10}, 0x78) [ 2475.524166][T23452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2475.532123][T23452] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:11 executing program 0: socketpair(0xf, 0x3, 0x1400, &(0x7f0000000040)) 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfff00000}, 0x10}, 0x78) 11:05:11 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:11 executing program 0: socketpair(0xf, 0x3, 0x1401, &(0x7f0000000040)) [ 2475.681960][T23464] FAULT_INJECTION: forcing a failure. [ 2475.681960][T23464] name failslab, interval 1, probability 0, space 0, times 0 11:05:11 executing program 2: socketpair(0x2, 0x6, 0x89010000, &(0x7f0000000000)) [ 2475.745862][T23464] CPU: 0 PID: 23464 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 2475.754314][T23464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2475.764381][T23464] Call Trace: [ 2475.767663][T23464] dump_stack_lvl+0xcd/0x134 [ 2475.772273][T23464] should_fail.cold+0x5/0xa [ 2475.776799][T23464] ? __anon_vma_prepare+0x62/0x560 [ 2475.781931][T23464] should_failslab+0x5/0x10 [ 2475.786456][T23464] kmem_cache_alloc+0x5e/0x4a0 [ 2475.791245][T23464] __anon_vma_prepare+0x62/0x560 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfffff000}, 0x10}, 0x78) [ 2475.796206][T23464] do_huge_pmd_anonymous_page+0xefe/0x2810 [ 2475.802037][T23464] ? mark_lock+0xef/0x17b0 [ 2475.806470][T23464] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2475.812477][T23464] __handle_mm_fault+0x2c14/0x5320 [ 2475.817626][T23464] ? vm_iomap_memory+0x190/0x190 [ 2475.822613][T23464] handle_mm_fault+0x1c8/0x790 [ 2475.827406][T23464] do_user_addr_fault+0x48b/0x11c0 [ 2475.832539][T23464] exc_page_fault+0x9e/0x180 [ 2475.837142][T23464] asm_exc_page_fault+0x1e/0x30 11:05:11 executing program 2: socketpair(0x2, 0x6, 0x8a000000, &(0x7f0000000000)) [ 2475.842010][T23464] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2475.847750][T23464] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 2475.867373][T23464] RSP: 0018:ffffc90002a27e40 EFLAGS: 00010293 [ 2475.873455][T23464] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 2475.881435][T23464] RDX: 0000000000040000 RSI: ffffffff87155b7b RDI: 0000000000000000 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xffffff85}, 0x10}, 0x78) [ 2475.889421][T23464] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 2475.897397][T23464] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 2475.905379][T23464] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 2475.913367][T23464] ? __sys_socketpair+0xfb/0x570 [ 2475.918329][T23464] __sys_socketpair+0x107/0x570 [ 2475.923195][T23464] ? __ia32_sys_socket+0xb0/0xb0 [ 2475.928161][T23464] __x64_sys_socketpair+0x93/0xf0 [ 2475.933202][T23464] ? syscall_enter_from_user_mode+0x21/0x70 [ 2475.939115][T23464] do_syscall_64+0x35/0xb0 11:05:11 executing program 2: socketpair(0x2, 0x6, 0x8a010000, &(0x7f0000000000)) [ 2475.943548][T23464] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2475.949454][T23464] RIP: 0033:0x4665f9 [ 2475.953357][T23464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2475.973323][T23464] RSP: 002b:00007f23e8b35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2475.981749][T23464] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xffffffff}, 0x10}, 0x78) [ 2475.989731][T23464] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 2475.997707][T23464] RBP: 00007f23e8b351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2476.005689][T23464] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2476.013669][T23464] R13: 00007ffc7d531fbf R14: 00007f23e8b35300 R15: 0000000000022000 [ 2476.054293][T23481] FAULT_INJECTION: forcing a failure. [ 2476.054293][T23481] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.079141][T23481] CPU: 0 PID: 23481 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2476.087584][T23481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2476.097646][T23481] Call Trace: [ 2476.100930][T23481] dump_stack_lvl+0xcd/0x134 [ 2476.105535][T23481] should_fail.cold+0x5/0xa [ 2476.110064][T23481] ? btf_new_fd+0x25c/0x2450 [ 2476.114670][T23481] should_failslab+0x5/0x10 [ 2476.119201][T23481] kmem_cache_alloc_trace+0x55/0x3c0 [ 2476.124525][T23481] btf_new_fd+0x25c/0x2450 [ 2476.128966][T23481] ? find_held_lock+0x2d/0x110 [ 2476.133772][T23481] ? __might_fault+0xd3/0x180 [ 2476.138472][T23481] ? lock_downgrade+0x6e0/0x6e0 [ 2476.143350][T23481] ? btf_type_snprintf_show+0x140/0x140 [ 2476.148912][T23481] ? apparmor_capable+0x1d8/0x460 [ 2476.153963][T23481] ? security_capable+0x8f/0xc0 [ 2476.158843][T23481] __sys_bpf+0x1baf/0x5df0 [ 2476.163284][T23481] ? bpf_link_get_from_fd+0x110/0x110 [ 2476.168683][T23481] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2476.174689][T23481] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2476.180698][T23481] ? find_held_lock+0x2d/0x110 [ 2476.185506][T23481] ? trace_hardirqs_on+0x38/0x1c0 [ 2476.190560][T23481] __x64_sys_bpf+0x75/0xb0 [ 2476.194999][T23481] ? syscall_enter_from_user_mode+0x21/0x70 11:05:11 executing program 4 (fault-call:0 fault-nth:1): socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:11 executing program 0: socketpair(0xf, 0x3, 0x1500, &(0x7f0000000040)) 11:05:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85100000}, 0x10}, 0x78) [ 2476.200916][T23481] do_syscall_64+0x35/0xb0 [ 2476.205362][T23481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2476.211281][T23481] RIP: 0033:0x4665f9 [ 2476.215181][T23481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2476.234801][T23481] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2476.243235][T23481] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2476.251222][T23481] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2476.259205][T23481] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2476.267184][T23481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2476.275161][T23481] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 [ 2476.354541][T23492] FAULT_INJECTION: forcing a failure. [ 2476.354541][T23492] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.368125][T23492] CPU: 1 PID: 23492 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 2476.376650][T23492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2476.386715][T23492] Call Trace: [ 2476.389995][T23492] dump_stack_lvl+0xcd/0x134 [ 2476.394606][T23492] should_fail.cold+0x5/0xa [ 2476.399223][T23492] ? __anon_vma_prepare+0x2d8/0x560 [ 2476.404415][T23492] should_failslab+0x5/0x10 [ 2476.408910][T23492] kmem_cache_alloc+0x5e/0x4a0 [ 2476.413698][T23492] __anon_vma_prepare+0x2d8/0x560 [ 2476.418742][T23492] do_huge_pmd_anonymous_page+0xefe/0x2810 [ 2476.424538][T23492] ? mark_lock+0xef/0x17b0 [ 2476.428946][T23492] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2476.434943][T23492] __handle_mm_fault+0x2c14/0x5320 [ 2476.440077][T23492] ? vm_iomap_memory+0x190/0x190 [ 2476.445017][T23492] handle_mm_fault+0x1c8/0x790 [ 2476.449789][T23492] do_user_addr_fault+0x48b/0x11c0 [ 2476.454929][T23492] exc_page_fault+0x9e/0x180 [ 2476.459530][T23492] asm_exc_page_fault+0x1e/0x30 [ 2476.464374][T23492] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2476.470086][T23492] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 2476.489707][T23492] RSP: 0018:ffffc90002f4fe40 EFLAGS: 00010293 [ 2476.495788][T23492] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 2476.503764][T23492] RDX: 0000000000040000 RSI: ffffffff87155b7b RDI: 0000000000000000 [ 2476.511721][T23492] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 2476.519710][T23492] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 2476.527668][T23492] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 2476.535640][T23492] ? __sys_socketpair+0xfb/0x570 [ 2476.540593][T23492] __sys_socketpair+0x107/0x570 [ 2476.545434][T23492] ? __ia32_sys_socket+0xb0/0xb0 [ 2476.550375][T23492] __x64_sys_socketpair+0x93/0xf0 [ 2476.555416][T23492] ? syscall_enter_from_user_mode+0x21/0x70 [ 2476.561323][T23492] do_syscall_64+0x35/0xb0 [ 2476.565730][T23492] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2476.571615][T23492] RIP: 0033:0x4665f9 [ 2476.575518][T23492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2476.595134][T23492] RSP: 002b:00007f23e8b35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 11:05:12 executing program 5 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:12 executing program 2: socketpair(0x2, 0x6, 0x8b000000, &(0x7f0000000000)) 11:05:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2}, 0x10}, 0x78) 11:05:12 executing program 0: socketpair(0xf, 0x3, 0x1501, &(0x7f0000000040)) 11:05:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85200000}, 0x10}, 0x78) [ 2476.603554][T23492] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2476.611515][T23492] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 2476.619511][T23492] RBP: 00007f23e8b351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2476.627481][T23492] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2476.635450][T23492] R13: 00007ffc7d531fbf R14: 00007f23e8b35300 R15: 0000000000022000 11:05:12 executing program 4 (fault-call:0 fault-nth:2): socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3}, 0x10}, 0x78) 11:05:12 executing program 2: socketpair(0x2, 0x6, 0x8b010000, &(0x7f0000000000)) 11:05:12 executing program 0: socketpair(0xf, 0x3, 0x1600, &(0x7f0000000040)) 11:05:12 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x85ffffff}, 0x10}, 0x78) [ 2476.812649][T23503] FAULT_INJECTION: forcing a failure. [ 2476.812649][T23503] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.884311][T23505] FAULT_INJECTION: forcing a failure. [ 2476.884311][T23505] name failslab, interval 1, probability 0, space 0, times 0 [ 2476.886031][T23503] CPU: 1 PID: 23503 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2476.905346][T23503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2476.915420][T23503] Call Trace: [ 2476.918708][T23503] dump_stack_lvl+0xcd/0x134 [ 2476.923321][T23503] should_fail.cold+0x5/0xa [ 2476.927852][T23503] ? btf_new_fd+0x4b9/0x2450 [ 2476.932458][T23503] should_failslab+0x5/0x10 [ 2476.936989][T23503] kmem_cache_alloc_trace+0x55/0x3c0 [ 2476.942303][T23503] btf_new_fd+0x4b9/0x2450 [ 2476.946729][T23503] ? find_held_lock+0x2d/0x110 [ 2476.951505][T23503] ? __might_fault+0xd3/0x180 [ 2476.956197][T23503] ? lock_downgrade+0x6e0/0x6e0 [ 2476.961498][T23503] ? btf_type_snprintf_show+0x140/0x140 [ 2476.967060][T23503] ? apparmor_capable+0x1d8/0x460 [ 2476.972098][T23503] ? security_capable+0x8f/0xc0 [ 2476.976969][T23503] __sys_bpf+0x1baf/0x5df0 [ 2476.981409][T23503] ? bpf_link_get_from_fd+0x110/0x110 [ 2476.986808][T23503] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2476.992889][T23503] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2476.998887][T23503] ? find_held_lock+0x2d/0x110 [ 2477.003671][T23503] ? trace_hardirqs_on+0x38/0x1c0 [ 2477.008698][T23503] __x64_sys_bpf+0x75/0xb0 [ 2477.013117][T23503] ? syscall_enter_from_user_mode+0x21/0x70 [ 2477.019009][T23503] do_syscall_64+0x35/0xb0 [ 2477.023425][T23503] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2477.029324][T23503] RIP: 0033:0x4665f9 [ 2477.033215][T23503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2477.052816][T23503] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2477.061226][T23503] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2477.069193][T23503] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2477.077161][T23503] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:12 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4}, 0x10}, 0x78) [ 2477.085126][T23503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2477.093091][T23503] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 [ 2477.112786][T23505] CPU: 1 PID: 23505 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 2477.121237][T23505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2477.131303][T23505] Call Trace: [ 2477.134608][T23505] dump_stack_lvl+0xcd/0x134 [ 2477.139226][T23505] should_fail.cold+0x5/0xa [ 2477.143757][T23505] ? __khugepaged_enter+0x34/0x390 [ 2477.148889][T23505] should_failslab+0x5/0x10 [ 2477.153415][T23505] kmem_cache_alloc+0x5e/0x4a0 [ 2477.158217][T23505] __khugepaged_enter+0x34/0x390 [ 2477.163181][T23505] do_huge_pmd_anonymous_page+0xb6a/0x2810 [ 2477.169020][T23505] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2477.175030][T23505] __handle_mm_fault+0x2c14/0x5320 [ 2477.180175][T23505] ? vm_iomap_memory+0x190/0x190 [ 2477.185161][T23505] handle_mm_fault+0x1c8/0x790 [ 2477.189956][T23505] do_user_addr_fault+0x48b/0x11c0 [ 2477.195098][T23505] exc_page_fault+0x9e/0x180 [ 2477.199710][T23505] asm_exc_page_fault+0x1e/0x30 [ 2477.204584][T23505] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2477.210444][T23505] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 2477.230073][T23505] RSP: 0018:ffffc90003067e40 EFLAGS: 00010293 [ 2477.236166][T23505] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 2477.244158][T23505] RDX: 0000000000040000 RSI: ffffffff87155b7b RDI: 0000000000000000 [ 2477.252172][T23505] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 2477.260409][T23505] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 2477.268380][T23505] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 2477.276359][T23505] ? __sys_socketpair+0xfb/0x570 [ 2477.281312][T23505] __sys_socketpair+0x107/0x570 [ 2477.286169][T23505] ? __ia32_sys_socket+0xb0/0xb0 [ 2477.291123][T23505] __x64_sys_socketpair+0x93/0xf0 [ 2477.296151][T23505] ? syscall_enter_from_user_mode+0x21/0x70 [ 2477.302059][T23505] do_syscall_64+0x35/0xb0 [ 2477.306477][T23505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2477.312372][T23505] RIP: 0033:0x4665f9 [ 2477.316266][T23505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:05:12 executing program 2: socketpair(0x2, 0x6, 0x8c000000, &(0x7f0000000000)) [ 2477.335870][T23505] RSP: 002b:00007f23e8b35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2477.344282][T23505] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2477.352249][T23505] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 2477.360395][T23505] RBP: 00007f23e8b351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2477.368377][T23505] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 2477.376363][T23505] R13: 00007ffc7d531fbf R14: 00007f23e8b35300 R15: 0000000000022000 11:05:13 executing program 5 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5}, 0x10}, 0x78) 11:05:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x90030000}, 0x10}, 0x78) 11:05:13 executing program 2: socketpair(0x2, 0x6, 0x8c010000, &(0x7f0000000000)) 11:05:13 executing program 0: socketpair(0xf, 0x3, 0x1601, &(0x7f0000000040)) 11:05:13 executing program 4 (fault-call:0 fault-nth:3): socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6}, 0x10}, 0x78) [ 2477.593627][T23526] FAULT_INJECTION: forcing a failure. [ 2477.593627][T23526] name failslab, interval 1, probability 0, space 0, times 0 11:05:13 executing program 0: socketpair(0xf, 0x3, 0x1700, &(0x7f0000000040)) [ 2477.642304][T23526] CPU: 1 PID: 23526 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2477.650763][T23526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2477.660830][T23526] Call Trace: [ 2477.664124][T23526] dump_stack_lvl+0xcd/0x134 [ 2477.669697][T23526] should_fail.cold+0x5/0xa [ 2477.674229][T23526] ? kvmalloc_node+0x61/0x120 [ 2477.678929][T23526] should_failslab+0x5/0x10 [ 2477.683456][T23526] __kmalloc_node+0x75/0x380 [ 2477.688074][T23526] kvmalloc_node+0x61/0x120 [ 2477.692602][T23526] btf_new_fd+0x50a/0x2450 [ 2477.697036][T23526] ? find_held_lock+0x2d/0x110 [ 2477.702169][T23526] ? __might_fault+0xd3/0x180 [ 2477.706869][T23526] ? lock_downgrade+0x6e0/0x6e0 [ 2477.711783][T23526] ? btf_type_snprintf_show+0x140/0x140 [ 2477.717347][T23526] ? apparmor_capable+0x1d8/0x460 [ 2477.722391][T23526] ? security_capable+0x8f/0xc0 [ 2477.727269][T23526] __sys_bpf+0x1baf/0x5df0 [ 2477.731718][T23526] ? bpf_link_get_from_fd+0x110/0x110 [ 2477.737116][T23526] ? lockdep_hardirqs_on_prepare+0x400/0x400 11:05:13 executing program 0: socketpair(0xf, 0x3, 0x1701, &(0x7f0000000040)) [ 2477.743115][T23526] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2477.749126][T23526] ? find_held_lock+0x2d/0x110 [ 2477.753938][T23526] ? trace_hardirqs_on+0x38/0x1c0 [ 2477.758986][T23526] __x64_sys_bpf+0x75/0xb0 [ 2477.763685][T23526] ? syscall_enter_from_user_mode+0x21/0x70 [ 2477.769599][T23526] do_syscall_64+0x35/0xb0 [ 2477.774038][T23526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2477.777480][T23529] FAULT_INJECTION: forcing a failure. [ 2477.777480][T23529] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2477.780036][T23526] RIP: 0033:0x4665f9 [ 2477.780060][T23526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2477.780086][T23526] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2477.780114][T23526] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2477.780132][T23526] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:13 executing program 2: socketpair(0x2, 0x6, 0x8d000000, &(0x7f0000000000)) 11:05:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x95020000}, 0x10}, 0x78) [ 2477.780148][T23526] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2477.780164][T23526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2477.780180][T23526] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:13 executing program 0: socketpair(0xf, 0x3, 0x1800, &(0x7f0000000040)) [ 2478.003809][T23529] CPU: 0 PID: 23529 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 2478.012269][T23529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2478.022347][T23529] Call Trace: [ 2478.025640][T23529] dump_stack_lvl+0xcd/0x134 [ 2478.030256][T23529] should_fail.cold+0x5/0xa [ 2478.034797][T23529] prepare_alloc_pages+0x17b/0x580 [ 2478.039943][T23529] __alloc_pages+0x12f/0x500 [ 2478.044557][T23529] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 2478.051348][T23529] ? __khugepaged_enter+0x298/0x390 [ 2478.056575][T23529] ? rwlock_bug.part.0+0x90/0x90 [ 2478.061962][T23529] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2478.067527][T23529] alloc_pages_vma+0x687/0x7a0 [ 2478.072325][T23529] do_huge_pmd_anonymous_page+0x439/0x2810 [ 2478.078165][T23529] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.084172][T23529] __handle_mm_fault+0x2c14/0x5320 [ 2478.089331][T23529] ? vm_iomap_memory+0x190/0x190 [ 2478.091170][T23548] FAULT_INJECTION: forcing a failure. [ 2478.091170][T23548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2478.094326][T23529] handle_mm_fault+0x1c8/0x790 [ 2478.094371][T23529] do_user_addr_fault+0x48b/0x11c0 [ 2478.094410][T23529] exc_page_fault+0x9e/0x180 [ 2478.121831][T23529] asm_exc_page_fault+0x1e/0x30 [ 2478.126701][T23529] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 2478.132445][T23529] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 2478.152080][T23529] RSP: 0018:ffffc90003027e40 EFLAGS: 00010293 [ 2478.158163][T23529] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 2478.166235][T23529] RDX: 0000000000040000 RSI: ffffffff87155b7b RDI: 0000000000000000 [ 2478.174210][T23529] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000 [ 2478.182185][T23529] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000004 [ 2478.190166][T23529] R13: 0000000000000005 R14: 0000000000000000 R15: dffffc0000000000 [ 2478.198156][T23529] ? __sys_socketpair+0xfb/0x570 [ 2478.203112][T23529] __sys_socketpair+0x107/0x570 [ 2478.207988][T23529] ? __ia32_sys_socket+0xb0/0xb0 [ 2478.212963][T23529] __x64_sys_socketpair+0x93/0xf0 [ 2478.218010][T23529] ? syscall_enter_from_user_mode+0x21/0x70 [ 2478.223925][T23529] do_syscall_64+0x35/0xb0 [ 2478.228362][T23529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2478.234391][T23529] RIP: 0033:0x4665f9 [ 2478.238298][T23529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.258009][T23529] RSP: 002b:00007f23e8b35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2478.266447][T23529] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2478.274424][T23529] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 2478.282404][T23529] RBP: 00007f23e8b351d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.290382][T23529] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 11:05:13 executing program 5 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:13 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7}, 0x10}, 0x78) 11:05:13 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb5010000}, 0x10}, 0x78) 11:05:13 executing program 2: socketpair(0x2, 0x6, 0x8d010000, &(0x7f0000000000)) 11:05:13 executing program 2: socketpair(0x2, 0x6, 0x8e000000, &(0x7f0000000000)) [ 2478.298364][T23529] R13: 00007ffc7d531fbf R14: 00007f23e8b35300 R15: 0000000000022000 [ 2478.306367][T23548] CPU: 1 PID: 23548 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2478.314799][T23548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2478.324857][T23548] Call Trace: [ 2478.328131][T23548] dump_stack_lvl+0xcd/0x134 [ 2478.332728][T23548] should_fail.cold+0x5/0xa [ 2478.337239][T23548] _copy_from_user+0x2c/0x180 [ 2478.341922][T23548] btf_new_fd+0x112b/0x2450 [ 2478.346424][T23548] ? find_held_lock+0x2d/0x110 [ 2478.351194][T23548] ? __might_fault+0xd3/0x180 [ 2478.355878][T23548] ? lock_downgrade+0x6e0/0x6e0 [ 2478.360751][T23548] ? btf_type_snprintf_show+0x140/0x140 [ 2478.366298][T23548] ? apparmor_capable+0x1d8/0x460 [ 2478.371322][T23548] ? security_capable+0x8f/0xc0 [ 2478.376173][T23548] __sys_bpf+0x1baf/0x5df0 [ 2478.380621][T23548] ? bpf_link_get_from_fd+0x110/0x110 [ 2478.386014][T23548] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.392003][T23548] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.398004][T23548] ? find_held_lock+0x2d/0x110 [ 2478.402966][T23548] ? trace_hardirqs_on+0x38/0x1c0 [ 2478.407995][T23548] __x64_sys_bpf+0x75/0xb0 [ 2478.412417][T23548] ? syscall_enter_from_user_mode+0x21/0x70 [ 2478.418310][T23548] do_syscall_64+0x35/0xb0 [ 2478.422745][T23548] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2478.428654][T23548] RIP: 0033:0x4665f9 [ 2478.432552][T23548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.452157][T23548] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2478.460830][T23548] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2478.468794][T23548] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2478.476756][T23548] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.484718][T23548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2478.492681][T23548] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:14 executing program 4: socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) 11:05:14 executing program 2: socketpair(0x2, 0x6, 0x8e010000, &(0x7f0000000000)) 11:05:14 executing program 0: socketpair(0xf, 0x3, 0x1801, &(0x7f0000000040)) 11:05:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8}, 0x10}, 0x78) 11:05:14 executing program 5 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xb9030000}, 0x10}, 0x78) 11:05:14 executing program 0: socketpair(0xf, 0x3, 0x1900, &(0x7f0000000040)) 11:05:14 executing program 2: socketpair(0x2, 0x6, 0x8f000000, &(0x7f0000000000)) 11:05:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xcd030000}, 0x10}, 0x78) 11:05:14 executing program 4: socketpair(0x2, 0x3, 0x2, &(0x7f0000000040)) [ 2478.789419][T23564] FAULT_INJECTION: forcing a failure. [ 2478.789419][T23564] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:05:14 executing program 0: socketpair(0xf, 0x3, 0x1901, &(0x7f0000000040)) [ 2478.870342][T23564] CPU: 0 PID: 23564 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2478.878807][T23564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2478.888877][T23564] Call Trace: [ 2478.892164][T23564] dump_stack_lvl+0xcd/0x134 [ 2478.896779][T23564] should_fail.cold+0x5/0xa [ 2478.901314][T23564] _copy_to_user+0x2c/0x150 [ 2478.905834][T23564] bpf_verifier_vlog+0x1b2/0x2e0 [ 2478.910814][T23564] __btf_verifier_log+0xbb/0xf0 [ 2478.915699][T23564] ? btf_id_cmp_func+0x90/0x90 11:05:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xec000000}, 0x10}, 0x78) 11:05:14 executing program 2: socketpair(0x2, 0x6, 0x8f010000, &(0x7f0000000000)) [ 2478.920506][T23564] btf_parse_hdr+0x392/0xc00 [ 2478.925124][T23564] ? btf_datasec_log+0xa0/0xa0 [ 2478.929923][T23564] btf_new_fd+0x5ae/0x2450 [ 2478.934356][T23564] ? find_held_lock+0x2d/0x110 [ 2478.939143][T23564] ? __might_fault+0xd3/0x180 [ 2478.943846][T23564] ? lock_downgrade+0x6e0/0x6e0 [ 2478.948719][T23564] ? btf_type_snprintf_show+0x140/0x140 [ 2478.954291][T23564] ? apparmor_capable+0x1d8/0x460 [ 2478.959344][T23564] ? security_capable+0x8f/0xc0 [ 2478.964223][T23564] __sys_bpf+0x1baf/0x5df0 [ 2478.968668][T23564] ? bpf_link_get_from_fd+0x110/0x110 [ 2478.974066][T23564] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.980071][T23564] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.986088][T23564] ? find_held_lock+0x2d/0x110 [ 2478.990899][T23564] ? trace_hardirqs_on+0x38/0x1c0 [ 2478.995949][T23564] __x64_sys_bpf+0x75/0xb0 [ 2479.000385][T23564] ? syscall_enter_from_user_mode+0x21/0x70 [ 2479.006299][T23564] do_syscall_64+0x35/0xb0 [ 2479.010747][T23564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2479.016678][T23564] RIP: 0033:0x4665f9 11:05:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xf9030000}, 0x10}, 0x78) [ 2479.020587][T23564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2479.040385][T23564] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2479.048822][T23564] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2479.056811][T23564] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:14 executing program 4: socketpair(0xa, 0x3, 0x2, &(0x7f0000000040)) 11:05:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa}, 0x10}, 0x78) [ 2479.064793][T23564] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2479.072776][T23564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2479.080759][T23564] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:14 executing program 5 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:14 executing program 2: socketpair(0x2, 0x6, 0x90000000, &(0x7f0000000000)) 11:05:14 executing program 0: socketpair(0xf, 0x3, 0x1a00, &(0x7f0000000040)) 11:05:14 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x48}, 0x10}, 0x78) 11:05:14 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfd000000}, 0x10}, 0x78) 11:05:14 executing program 4: socketpair(0x2d, 0x3, 0x2, &(0x7f0000000040)) [ 2479.412759][T23595] FAULT_INJECTION: forcing a failure. [ 2479.412759][T23595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2479.449189][T23595] CPU: 1 PID: 23595 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2479.457644][T23595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.467720][T23595] Call Trace: [ 2479.471008][T23595] dump_stack_lvl+0xcd/0x134 [ 2479.475623][T23595] should_fail.cold+0x5/0xa [ 2479.480424][T23595] _copy_to_user+0x2c/0x150 [ 2479.484954][T23595] bpf_verifier_vlog+0x1b2/0x2e0 [ 2479.489923][T23595] __btf_verifier_log+0xbb/0xf0 [ 2479.494802][T23595] ? btf_id_cmp_func+0x90/0x90 [ 2479.499610][T23595] btf_parse_hdr+0x3d1/0xc00 [ 2479.504258][T23595] ? btf_datasec_log+0xa0/0xa0 11:05:15 executing program 2: socketpair(0x2, 0x6, 0x90010000, &(0x7f0000000000)) 11:05:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c}, 0x10}, 0x78) [ 2479.509052][T23595] btf_new_fd+0x5ae/0x2450 [ 2479.513483][T23595] ? find_held_lock+0x2d/0x110 [ 2479.518269][T23595] ? __might_fault+0xd3/0x180 [ 2479.522966][T23595] ? lock_downgrade+0x6e0/0x6e0 [ 2479.527842][T23595] ? btf_type_snprintf_show+0x140/0x140 [ 2479.533413][T23595] ? apparmor_capable+0x1d8/0x460 [ 2479.538474][T23595] ? security_capable+0x8f/0xc0 [ 2479.543352][T23595] __sys_bpf+0x1baf/0x5df0 [ 2479.547795][T23595] ? bpf_link_get_from_fd+0x110/0x110 [ 2479.553198][T23595] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2479.559196][T23595] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2479.565210][T23595] ? find_held_lock+0x2d/0x110 [ 2479.570021][T23595] ? trace_hardirqs_on+0x38/0x1c0 [ 2479.575072][T23595] __x64_sys_bpf+0x75/0xb0 [ 2479.579513][T23595] ? syscall_enter_from_user_mode+0x21/0x70 [ 2479.585425][T23595] do_syscall_64+0x35/0xb0 [ 2479.589863][T23595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2479.595779][T23595] RIP: 0033:0x4665f9 [ 2479.599686][T23595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2479.619309][T23595] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2479.627740][T23595] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2479.635724][T23595] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2479.643711][T23595] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2479.651697][T23595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 11:05:15 executing program 0: socketpair(0xf, 0x3, 0x1a01, &(0x7f0000000040)) 11:05:15 executing program 2: socketpair(0x2, 0x6, 0x91000000, &(0x7f0000000000)) 11:05:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfe231a00}, 0x10}, 0x78) [ 2479.659681][T23595] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:15 executing program 5 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d}, 0x10}, 0x78) 11:05:15 executing program 4: socketpair(0x1000000a, 0x3, 0x2, &(0x7f0000000040)) 11:05:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xff000000}, 0x10}, 0x78) 11:05:15 executing program 2: socketpair(0x2, 0x6, 0x91010000, &(0x7f0000000000)) 11:05:15 executing program 0: socketpair(0xf, 0x3, 0x1b00, &(0x7f0000000040)) [ 2479.903226][T23613] FAULT_INJECTION: forcing a failure. [ 2479.903226][T23613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2479.965576][T23613] CPU: 0 PID: 23613 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2479.974041][T23613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2479.984114][T23613] Call Trace: [ 2479.987401][T23613] dump_stack_lvl+0xcd/0x134 [ 2479.992014][T23613] should_fail.cold+0x5/0xa [ 2479.996552][T23613] _copy_to_user+0x2c/0x150 [ 2480.001083][T23613] bpf_verifier_vlog+0x1b2/0x2e0 [ 2480.006046][T23613] __btf_verifier_log+0xbb/0xf0 [ 2480.010921][T23613] ? btf_id_cmp_func+0x90/0x90 [ 2480.015728][T23613] btf_parse_hdr+0x410/0xc00 [ 2480.020347][T23613] ? btf_datasec_log+0xa0/0xa0 [ 2480.025143][T23613] btf_new_fd+0x5ae/0x2450 [ 2480.029573][T23613] ? find_held_lock+0x2d/0x110 [ 2480.034364][T23613] ? __might_fault+0xd3/0x180 [ 2480.039066][T23613] ? lock_downgrade+0x6e0/0x6e0 [ 2480.043944][T23613] ? btf_type_snprintf_show+0x140/0x140 [ 2480.049513][T23613] ? apparmor_capable+0x1d8/0x460 [ 2480.054565][T23613] ? security_capable+0x8f/0xc0 [ 2480.059443][T23613] __sys_bpf+0x1baf/0x5df0 [ 2480.063886][T23613] ? bpf_link_get_from_fd+0x110/0x110 [ 2480.069291][T23613] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2480.075296][T23613] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2480.081309][T23613] ? find_held_lock+0x2d/0x110 [ 2480.086121][T23613] ? trace_hardirqs_on+0x38/0x1c0 [ 2480.091170][T23613] __x64_sys_bpf+0x75/0xb0 [ 2480.095604][T23613] ? syscall_enter_from_user_mode+0x21/0x70 [ 2480.101534][T23613] do_syscall_64+0x35/0xb0 [ 2480.105974][T23613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2480.111913][T23613] RIP: 0033:0x4665f9 [ 2480.115821][T23613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.135447][T23613] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2480.143885][T23613] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2480.151874][T23613] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:15 executing program 4: socketpair(0xffffffffffffffff, 0x3, 0x2, &(0x7f0000000040)) 11:05:15 executing program 2: socketpair(0x2, 0x6, 0x92000000, &(0x7f0000000000)) 11:05:15 executing program 0: socketpair(0xf, 0x3, 0x1b01, &(0x7f0000000040)) 11:05:15 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfff00000}, 0x10}, 0x78) 11:05:15 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x68}, 0x10}, 0x78) [ 2480.159871][T23613] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.167863][T23613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2480.175854][T23613] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:15 executing program 0: socketpair(0xf, 0x3, 0x1c00, &(0x7f0000000040)) 11:05:16 executing program 5 (fault-call:0 fault-nth:8): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:16 executing program 4: socketpair(0xf, 0x4, 0x2, &(0x7f0000000040)) 11:05:16 executing program 2: socketpair(0x2, 0x6, 0x92010000, &(0x7f0000000000)) 11:05:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xfffff000}, 0x10}, 0x78) 11:05:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c}, 0x10}, 0x78) 11:05:16 executing program 0: socketpair(0xf, 0x3, 0x1c01, &(0x7f0000000040)) 11:05:16 executing program 2: socketpair(0x2, 0x6, 0x93000000, &(0x7f0000000000)) 11:05:16 executing program 4: socketpair(0xf, 0xa, 0x2, &(0x7f0000000040)) 11:05:16 executing program 0: socketpair(0xf, 0x3, 0x1d00, &(0x7f0000000040)) 11:05:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xffffff85}, 0x10}, 0x78) 11:05:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x74}, 0x10}, 0x78) [ 2480.553119][T23645] FAULT_INJECTION: forcing a failure. [ 2480.553119][T23645] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2480.619214][T23645] CPU: 1 PID: 23645 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2480.627673][T23645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2480.637748][T23645] Call Trace: [ 2480.641032][T23645] dump_stack_lvl+0xcd/0x134 [ 2480.645630][T23645] should_fail.cold+0x5/0xa [ 2480.650143][T23645] _copy_to_user+0x2c/0x150 [ 2480.654654][T23645] bpf_verifier_vlog+0x1b2/0x2e0 [ 2480.659615][T23645] __btf_verifier_log+0xbb/0xf0 [ 2480.664474][T23645] ? btf_id_cmp_func+0x90/0x90 [ 2480.669253][T23645] btf_parse_hdr+0x451/0xc00 [ 2480.673867][T23645] ? btf_datasec_log+0xa0/0xa0 [ 2480.678659][T23645] btf_new_fd+0x5ae/0x2450 [ 2480.683076][T23645] ? find_held_lock+0x2d/0x110 [ 2480.687842][T23645] ? __might_fault+0xd3/0x180 [ 2480.692520][T23645] ? lock_downgrade+0x6e0/0x6e0 [ 2480.697370][T23645] ? btf_type_snprintf_show+0x140/0x140 [ 2480.702912][T23645] ? apparmor_capable+0x1d8/0x460 [ 2480.707938][T23645] ? security_capable+0x8f/0xc0 [ 2480.712791][T23645] __sys_bpf+0x1baf/0x5df0 [ 2480.717213][T23645] ? bpf_link_get_from_fd+0x110/0x110 [ 2480.722591][T23645] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2480.728570][T23645] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2480.734559][T23645] ? find_held_lock+0x2d/0x110 [ 2480.739338][T23645] ? trace_hardirqs_on+0x38/0x1c0 [ 2480.744364][T23645] __x64_sys_bpf+0x75/0xb0 [ 2480.748797][T23645] ? syscall_enter_from_user_mode+0x21/0x70 [ 2480.754690][T23645] do_syscall_64+0x35/0xb0 [ 2480.759112][T23645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2480.765007][T23645] RIP: 0033:0x4665f9 [ 2480.768897][T23645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2480.788496][T23645] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2480.796904][T23645] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2480.804867][T23645] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2480.812829][T23645] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2480.820792][T23645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2480.828755][T23645] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:16 executing program 4: socketpair(0xf, 0x3, 0x4, &(0x7f0000000040)) 11:05:16 executing program 5 (fault-call:0 fault-nth:9): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:16 executing program 2: socketpair(0x2, 0x6, 0x93010000, &(0x7f0000000000)) 11:05:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0xffffffff}, 0x10}, 0x78) 11:05:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a}, 0x10}, 0x78) 11:05:16 executing program 0: socketpair(0xf, 0x3, 0x1d01, &(0x7f0000000040)) 11:05:16 executing program 4: socketpair(0xf, 0x3, 0x201, &(0x7f0000000040)) 11:05:16 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x10}, 0x78) 11:05:16 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85}, 0x10}, 0x78) 11:05:16 executing program 0: socketpair(0xf, 0x3, 0x1e00, &(0x7f0000000040)) 11:05:16 executing program 2: socketpair(0x2, 0x6, 0x94000000, &(0x7f0000000000)) 11:05:16 executing program 4: socketpair(0xf, 0x3, 0x300, &(0x7f0000000040)) [ 2481.206227][T23669] FAULT_INJECTION: forcing a failure. [ 2481.206227][T23669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.249818][T23669] CPU: 0 PID: 23669 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2481.258282][T23669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.268357][T23669] Call Trace: [ 2481.271656][T23669] dump_stack_lvl+0xcd/0x134 [ 2481.276268][T23669] should_fail.cold+0x5/0xa [ 2481.280800][T23669] _copy_to_user+0x2c/0x150 [ 2481.285356][T23669] bpf_verifier_vlog+0x1b2/0x2e0 [ 2481.290322][T23669] __btf_verifier_log+0xbb/0xf0 [ 2481.295207][T23669] ? btf_id_cmp_func+0x90/0x90 [ 2481.300023][T23669] btf_parse_hdr+0x492/0xc00 [ 2481.304651][T23669] ? btf_datasec_log+0xa0/0xa0 [ 2481.309455][T23669] btf_new_fd+0x5ae/0x2450 [ 2481.313893][T23669] ? find_held_lock+0x2d/0x110 [ 2481.318683][T23669] ? __might_fault+0xd3/0x180 [ 2481.323385][T23669] ? lock_downgrade+0x6e0/0x6e0 [ 2481.328262][T23669] ? btf_type_snprintf_show+0x140/0x140 [ 2481.333834][T23669] ? apparmor_capable+0x1d8/0x460 [ 2481.338888][T23669] ? security_capable+0x8f/0xc0 [ 2481.343765][T23669] __sys_bpf+0x1baf/0x5df0 [ 2481.348214][T23669] ? bpf_link_get_from_fd+0x110/0x110 [ 2481.353618][T23669] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2481.359621][T23669] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2481.365636][T23669] ? find_held_lock+0x2d/0x110 [ 2481.370443][T23669] ? trace_hardirqs_on+0x38/0x1c0 [ 2481.375490][T23669] __x64_sys_bpf+0x75/0xb0 [ 2481.379922][T23669] ? syscall_enter_from_user_mode+0x21/0x70 [ 2481.385835][T23669] do_syscall_64+0x35/0xb0 [ 2481.390271][T23669] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2481.396181][T23669] RIP: 0033:0x4665f9 [ 2481.400085][T23669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.419713][T23669] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2481.428139][T23669] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2481.436132][T23669] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:17 executing program 4: socketpair(0xf, 0x3, 0x301, &(0x7f0000000040)) [ 2481.444119][T23669] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.452104][T23669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.460087][T23669] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:17 executing program 5 (fault-call:0 fault-nth:10): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:17 executing program 4: socketpair(0xf, 0x3, 0x500, &(0x7f0000000040)) 11:05:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2}, 0x10}, 0x78) 11:05:17 executing program 0: socketpair(0xf, 0x3, 0x1e01, &(0x7f0000000040)) 11:05:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec}, 0x10}, 0x78) 11:05:17 executing program 2: socketpair(0x2, 0x6, 0x94010000, &(0x7f0000000000)) 11:05:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3}, 0x10}, 0x78) 11:05:17 executing program 2: socketpair(0x2, 0x6, 0x95000000, &(0x7f0000000000)) 11:05:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0}, 0x10}, 0x78) 11:05:17 executing program 0: socketpair(0xf, 0x3, 0x1f00, &(0x7f0000000040)) 11:05:17 executing program 4: socketpair(0xf, 0x3, 0x501, &(0x7f0000000040)) [ 2481.711917][T23693] FAULT_INJECTION: forcing a failure. [ 2481.711917][T23693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2481.771821][T23693] CPU: 0 PID: 23693 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2481.780284][T23693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2481.790355][T23693] Call Trace: [ 2481.793647][T23693] dump_stack_lvl+0xcd/0x134 [ 2481.798260][T23693] should_fail.cold+0x5/0xa [ 2481.802798][T23693] _copy_to_user+0x2c/0x150 [ 2481.807320][T23693] bpf_verifier_vlog+0x1b2/0x2e0 [ 2481.812290][T23693] __btf_verifier_log+0xbb/0xf0 [ 2481.817168][T23693] ? btf_id_cmp_func+0x90/0x90 11:05:17 executing program 4: socketpair(0xf, 0x3, 0x600, &(0x7f0000000040)) [ 2481.821969][T23693] btf_parse_hdr+0x4d3/0xc00 [ 2481.826588][T23693] ? btf_datasec_log+0xa0/0xa0 [ 2481.831390][T23693] btf_new_fd+0x5ae/0x2450 [ 2481.835825][T23693] ? find_held_lock+0x2d/0x110 [ 2481.840614][T23693] ? __might_fault+0xd3/0x180 [ 2481.845320][T23693] ? lock_downgrade+0x6e0/0x6e0 [ 2481.850196][T23693] ? btf_type_snprintf_show+0x140/0x140 [ 2481.855758][T23693] ? apparmor_capable+0x1d8/0x460 [ 2481.860807][T23693] ? security_capable+0x8f/0xc0 [ 2481.865686][T23693] __sys_bpf+0x1baf/0x5df0 [ 2481.870127][T23693] ? bpf_link_get_from_fd+0x110/0x110 [ 2481.875526][T23693] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2481.881525][T23693] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2481.887537][T23693] ? find_held_lock+0x2d/0x110 [ 2481.892343][T23693] ? trace_hardirqs_on+0x38/0x1c0 [ 2481.897393][T23693] __x64_sys_bpf+0x75/0xb0 [ 2481.901836][T23693] ? syscall_enter_from_user_mode+0x21/0x70 [ 2481.907753][T23693] do_syscall_64+0x35/0xb0 [ 2481.912192][T23693] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2481.918105][T23693] RIP: 0033:0x4665f9 [ 2481.922008][T23693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2481.941631][T23693] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2481.950068][T23693] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2481.958058][T23693] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2481.966043][T23693] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2481.974029][T23693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2481.982011][T23693] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:17 executing program 5 (fault-call:0 fault-nth:11): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:17 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4}, 0x10}, 0x78) 11:05:17 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd}, 0x10}, 0x78) 11:05:17 executing program 4: socketpair(0xf, 0x3, 0x601, &(0x7f0000000040)) 11:05:17 executing program 2: socketpair(0x2, 0x6, 0x95010000, &(0x7f0000000000)) 11:05:17 executing program 0: socketpair(0xf, 0x3, 0x1f01, &(0x7f0000000040)) [ 2482.212181][T23717] FAULT_INJECTION: forcing a failure. [ 2482.212181][T23717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2482.239343][T23717] CPU: 1 PID: 23717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2482.247817][T23717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2482.257893][T23717] Call Trace: 11:05:18 executing program 0: socketpair(0xf, 0x3, 0x2000, &(0x7f0000000040)) 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x179}, 0x10}, 0x78) [ 2482.261197][T23717] dump_stack_lvl+0xcd/0x134 [ 2482.265815][T23717] should_fail.cold+0x5/0xa [ 2482.270355][T23717] _copy_to_user+0x2c/0x150 [ 2482.274883][T23717] bpf_verifier_vlog+0x1b2/0x2e0 [ 2482.279862][T23717] __btf_verifier_log+0xbb/0xf0 [ 2482.284740][T23717] ? btf_id_cmp_func+0x90/0x90 [ 2482.289546][T23717] btf_parse_hdr+0x514/0xc00 [ 2482.294166][T23717] ? btf_datasec_log+0xa0/0xa0 [ 2482.298971][T23717] btf_new_fd+0x5ae/0x2450 [ 2482.303408][T23717] ? find_held_lock+0x2d/0x110 [ 2482.308197][T23717] ? __might_fault+0xd3/0x180 [ 2482.312902][T23717] ? lock_downgrade+0x6e0/0x6e0 [ 2482.317790][T23717] ? btf_type_snprintf_show+0x140/0x140 [ 2482.323353][T23717] ? apparmor_capable+0x1d8/0x460 [ 2482.328396][T23717] ? security_capable+0x8f/0xc0 [ 2482.333260][T23717] __sys_bpf+0x1baf/0x5df0 [ 2482.337688][T23717] ? bpf_link_get_from_fd+0x110/0x110 [ 2482.343072][T23717] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2482.349065][T23717] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2482.355071][T23717] ? find_held_lock+0x2d/0x110 [ 2482.359867][T23717] ? trace_hardirqs_on+0x38/0x1c0 [ 2482.364897][T23717] __x64_sys_bpf+0x75/0xb0 [ 2482.369315][T23717] ? syscall_enter_from_user_mode+0x21/0x70 [ 2482.375207][T23717] do_syscall_64+0x35/0xb0 [ 2482.379622][T23717] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2482.385514][T23717] RIP: 0033:0x4665f9 [ 2482.389411][T23717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:05:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5}, 0x10}, 0x78) 11:05:18 executing program 4: socketpair(0xf, 0x3, 0x700, &(0x7f0000000040)) 11:05:18 executing program 2: socketpair(0x2, 0x6, 0x96000000, &(0x7f0000000000)) [ 2482.409035][T23717] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2482.417461][T23717] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2482.425440][T23717] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2482.433408][T23717] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2482.441381][T23717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2482.449354][T23717] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1b5}, 0x10}, 0x78) 11:05:18 executing program 5 (fault-call:0 fault-nth:12): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:18 executing program 0: socketpair(0xf, 0x3, 0x2001, &(0x7f0000000040)) 11:05:18 executing program 2: socketpair(0x2, 0x6, 0x96010000, &(0x7f0000000000)) 11:05:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6}, 0x10}, 0x78) 11:05:18 executing program 4: socketpair(0xf, 0x3, 0x701, &(0x7f0000000040)) 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x295}, 0x10}, 0x78) 11:05:18 executing program 2: socketpair(0x2, 0x6, 0x97000000, &(0x7f0000000000)) 11:05:18 executing program 4: socketpair(0xf, 0x3, 0x801, &(0x7f0000000040)) 11:05:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7}, 0x10}, 0x78) 11:05:18 executing program 0: socketpair(0xf, 0x3, 0x2100, &(0x7f0000000040)) 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x300}, 0x10}, 0x78) [ 2482.929251][T23741] FAULT_INJECTION: forcing a failure. [ 2482.929251][T23741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2482.973024][T23741] CPU: 0 PID: 23741 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2482.981489][T23741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2482.991557][T23741] Call Trace: [ 2482.994846][T23741] dump_stack_lvl+0xcd/0x134 [ 2482.999458][T23741] should_fail.cold+0x5/0xa [ 2483.004002][T23741] _copy_to_user+0x2c/0x150 [ 2483.008527][T23741] bpf_verifier_vlog+0x1b2/0x2e0 [ 2483.013497][T23741] __btf_verifier_log+0xbb/0xf0 [ 2483.018361][T23741] ? btf_id_cmp_func+0x90/0x90 [ 2483.023164][T23741] btf_parse_hdr+0x555/0xc00 [ 2483.027780][T23741] ? btf_datasec_log+0xa0/0xa0 [ 2483.032572][T23741] btf_new_fd+0x5ae/0x2450 [ 2483.037003][T23741] ? find_held_lock+0x2d/0x110 [ 2483.041783][T23741] ? __might_fault+0xd3/0x180 [ 2483.046481][T23741] ? lock_downgrade+0x6e0/0x6e0 [ 2483.051357][T23741] ? btf_type_snprintf_show+0x140/0x140 [ 2483.056927][T23741] ? apparmor_capable+0x1d8/0x460 [ 2483.061973][T23741] ? security_capable+0x8f/0xc0 [ 2483.066850][T23741] __sys_bpf+0x1baf/0x5df0 [ 2483.071296][T23741] ? bpf_link_get_from_fd+0x110/0x110 [ 2483.076696][T23741] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2483.082698][T23741] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2483.088708][T23741] ? find_held_lock+0x2d/0x110 [ 2483.093514][T23741] ? trace_hardirqs_on+0x38/0x1c0 [ 2483.098559][T23741] __x64_sys_bpf+0x75/0xb0 [ 2483.102994][T23741] ? syscall_enter_from_user_mode+0x21/0x70 [ 2483.108900][T23741] do_syscall_64+0x35/0xb0 [ 2483.113338][T23741] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2483.119245][T23741] RIP: 0033:0x4665f9 [ 2483.123146][T23741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2483.143212][T23741] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2483.151642][T23741] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2483.159624][T23741] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x32d}, 0x10}, 0x78) [ 2483.167615][T23741] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2483.175613][T23741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2483.183605][T23741] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:18 executing program 5 (fault-call:0 fault-nth:13): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:18 executing program 0: socketpair(0xf, 0x3, 0x2101, &(0x7f0000000040)) 11:05:18 executing program 4: socketpair(0xf, 0x3, 0x900, &(0x7f0000000040)) 11:05:18 executing program 2: socketpair(0x2, 0x6, 0x97010000, &(0x7f0000000000)) 11:05:18 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8}, 0x10}, 0x78) 11:05:18 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x351}, 0x10}, 0x78) 11:05:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x390}, 0x10}, 0x78) 11:05:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa}, 0x10}, 0x78) 11:05:19 executing program 0: socketpair(0xf, 0x3, 0x2200, &(0x7f0000000040)) 11:05:19 executing program 2: socketpair(0x2, 0x6, 0x98000000, &(0x7f0000000000)) 11:05:19 executing program 4: socketpair(0xf, 0x3, 0x901, &(0x7f0000000040)) [ 2483.477279][T23765] FAULT_INJECTION: forcing a failure. [ 2483.477279][T23765] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2483.548903][T23765] CPU: 1 PID: 23765 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2483.557373][T23765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.567791][T23765] Call Trace: [ 2483.571073][T23765] dump_stack_lvl+0xcd/0x134 [ 2483.575675][T23765] should_fail.cold+0x5/0xa [ 2483.580188][T23765] _copy_to_user+0x2c/0x150 [ 2483.584697][T23765] bpf_verifier_vlog+0x1b2/0x2e0 [ 2483.589644][T23765] __btf_verifier_log+0xbb/0xf0 [ 2483.594506][T23765] ? btf_id_cmp_func+0x90/0x90 [ 2483.599302][T23765] btf_parse_hdr+0x566/0xc00 [ 2483.603901][T23765] ? btf_datasec_log+0xa0/0xa0 [ 2483.608678][T23765] btf_new_fd+0x5ae/0x2450 [ 2483.613098][T23765] ? find_held_lock+0x2d/0x110 [ 2483.617866][T23765] ? __might_fault+0xd3/0x180 [ 2483.622550][T23765] ? lock_downgrade+0x6e0/0x6e0 [ 2483.627415][T23765] ? btf_type_snprintf_show+0x140/0x140 [ 2483.632964][T23765] ? apparmor_capable+0x1d8/0x460 [ 2483.637996][T23765] ? security_capable+0x8f/0xc0 [ 2483.642856][T23765] __sys_bpf+0x1baf/0x5df0 [ 2483.647286][T23765] ? bpf_link_get_from_fd+0x110/0x110 [ 2483.652666][T23765] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2483.658649][T23765] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2483.664638][T23765] ? find_held_lock+0x2d/0x110 [ 2483.669422][T23765] ? trace_hardirqs_on+0x38/0x1c0 [ 2483.674457][T23765] __x64_sys_bpf+0x75/0xb0 [ 2483.678878][T23765] ? syscall_enter_from_user_mode+0x21/0x70 [ 2483.684777][T23765] do_syscall_64+0x35/0xb0 [ 2483.689199][T23765] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2483.695183][T23765] RIP: 0033:0x4665f9 [ 2483.699073][T23765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2483.718680][T23765] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2483.727090][T23765] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2483.735059][T23765] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2483.743029][T23765] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2483.750997][T23765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2483.758963][T23765] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3b9}, 0x10}, 0x78) 11:05:19 executing program 5 (fault-call:0 fault-nth:14): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:19 executing program 0: socketpair(0xf, 0x3, 0x2201, &(0x7f0000000040)) 11:05:19 executing program 4: socketpair(0xf, 0x3, 0xa00, &(0x7f0000000040)) 11:05:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3cd}, 0x10}, 0x78) 11:05:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x48}, 0x10}, 0x78) 11:05:19 executing program 2: socketpair(0x2, 0x6, 0x98010000, &(0x7f0000000000)) 11:05:19 executing program 2: socketpair(0x2, 0x6, 0x99000000, &(0x7f0000000000)) 11:05:19 executing program 4: socketpair(0xf, 0x3, 0xa01, &(0x7f0000000040)) 11:05:19 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c}, 0x10}, 0x78) [ 2484.155452][T23789] FAULT_INJECTION: forcing a failure. [ 2484.155452][T23789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2484.196480][T23789] CPU: 1 PID: 23789 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2484.204947][T23789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2484.215019][T23789] Call Trace: [ 2484.218315][T23789] dump_stack_lvl+0xcd/0x134 [ 2484.222930][T23789] should_fail.cold+0x5/0xa [ 2484.227468][T23789] _copy_to_user+0x2c/0x150 [ 2484.231992][T23789] bpf_verifier_vlog+0x1b2/0x2e0 [ 2484.236965][T23789] __btf_verifier_log+0xbb/0xf0 [ 2484.241852][T23789] ? btf_id_cmp_func+0x90/0x90 11:05:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3f9}, 0x10}, 0x78) [ 2484.246649][T23789] ? __might_fault+0xd3/0x180 [ 2484.251370][T23789] __btf_verifier_log_type+0x771/0x8e0 [ 2484.256866][T23789] ? btf_var_show+0x380/0x380 [ 2484.261569][T23789] ? __btf_verifier_log+0xbb/0xf0 [ 2484.266622][T23789] ? btf_id_cmp_func+0x90/0x90 [ 2484.271407][T23789] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2484.277672][T23789] ? do_swap+0x132/0x210 [ 2484.281940][T23789] btf_enum_check_meta+0x1d6/0x6a0 [ 2484.287086][T23789] btf_check_all_metas+0x3a6/0xa40 [ 2484.292232][T23789] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2484.298506][T23789] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2484.303638][T23789] btf_new_fd+0x976/0x2450 [ 2484.308062][T23789] ? find_held_lock+0x2d/0x110 [ 2484.312831][T23789] ? __might_fault+0xd3/0x180 [ 2484.317511][T23789] ? lock_downgrade+0x6e0/0x6e0 [ 2484.322372][T23789] ? btf_type_snprintf_show+0x140/0x140 [ 2484.327919][T23789] ? apparmor_capable+0x1d8/0x460 [ 2484.332951][T23789] ? security_capable+0x8f/0xc0 [ 2484.337809][T23789] __sys_bpf+0x1baf/0x5df0 [ 2484.342237][T23789] ? bpf_link_get_from_fd+0x110/0x110 [ 2484.347616][T23789] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2484.353599][T23789] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2484.359590][T23789] ? find_held_lock+0x2d/0x110 [ 2484.364371][T23789] ? trace_hardirqs_on+0x38/0x1c0 [ 2484.369403][T23789] __x64_sys_bpf+0x75/0xb0 [ 2484.373840][T23789] ? syscall_enter_from_user_mode+0x21/0x70 [ 2484.379746][T23789] do_syscall_64+0x35/0xb0 [ 2484.384170][T23789] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2484.390079][T23789] RIP: 0033:0x4665f9 [ 2484.393971][T23789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2484.413584][T23789] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2484.422008][T23789] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2484.429998][T23789] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2484.437985][T23789] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:20 executing program 0: socketpair(0xf, 0x3, 0x2300, &(0x7f0000000040)) [ 2484.445950][T23789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2484.453917][T23789] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:20 executing program 4: socketpair(0xf, 0x3, 0xb00, &(0x7f0000000040)) 11:05:20 executing program 5 (fault-call:0 fault-nth:15): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x500}, 0x10}, 0x78) 11:05:20 executing program 0: socketpair(0xf, 0x3, 0x2301, &(0x7f0000000040)) 11:05:20 executing program 2: socketpair(0x2, 0x6, 0x99010000, &(0x7f0000000000)) 11:05:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d}, 0x10}, 0x78) 11:05:20 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x600}, 0x10}, 0x78) 11:05:20 executing program 4: socketpair(0xf, 0x3, 0xb01, &(0x7f0000000040)) 11:05:20 executing program 0: socketpair(0xf, 0x3, 0x2400, &(0x7f0000000040)) [ 2484.846050][T23809] FAULT_INJECTION: forcing a failure. [ 2484.846050][T23809] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2484.897432][T23809] CPU: 1 PID: 23809 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2484.905896][T23809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2484.915974][T23809] Call Trace: [ 2484.919270][T23809] dump_stack_lvl+0xcd/0x134 [ 2484.923891][T23809] should_fail.cold+0x5/0xa [ 2484.928458][T23809] _copy_to_user+0x2c/0x150 [ 2484.933000][T23809] bpf_verifier_vlog+0x1b2/0x2e0 [ 2484.937975][T23809] btf_verifier_log+0x1c8/0x270 [ 2484.942855][T23809] ? btf_free_rcu+0xd0/0xd0 [ 2484.947404][T23809] __btf_verifier_log_type+0x4f3/0x8e0 [ 2484.952895][T23809] ? btf_var_show+0x380/0x380 [ 2484.957603][T23809] ? __btf_verifier_log+0xbb/0xf0 [ 2484.962668][T23809] ? btf_id_cmp_func+0x90/0x90 [ 2484.967468][T23809] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2484.973727][T23809] ? do_swap+0x132/0x210 [ 2484.977983][T23809] btf_enum_check_meta+0x1d6/0x6a0 [ 2484.983108][T23809] btf_check_all_metas+0x3a6/0xa40 [ 2484.988230][T23809] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2484.994475][T23809] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2484.999592][T23809] btf_new_fd+0x976/0x2450 [ 2485.004009][T23809] ? find_held_lock+0x2d/0x110 [ 2485.008780][T23809] ? __might_fault+0xd3/0x180 [ 2485.013465][T23809] ? lock_downgrade+0x6e0/0x6e0 [ 2485.018325][T23809] ? btf_type_snprintf_show+0x140/0x140 [ 2485.023868][T23809] ? apparmor_capable+0x1d8/0x460 [ 2485.028904][T23809] ? security_capable+0x8f/0xc0 [ 2485.033762][T23809] __sys_bpf+0x1baf/0x5df0 [ 2485.038192][T23809] ? bpf_link_get_from_fd+0x110/0x110 [ 2485.043568][T23809] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2485.049552][T23809] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2485.055547][T23809] ? find_held_lock+0x2d/0x110 [ 2485.060334][T23809] ? trace_hardirqs_on+0x38/0x1c0 [ 2485.065374][T23809] __x64_sys_bpf+0x75/0xb0 [ 2485.069792][T23809] ? syscall_enter_from_user_mode+0x21/0x70 [ 2485.075692][T23809] do_syscall_64+0x35/0xb0 [ 2485.080133][T23809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2485.086031][T23809] RIP: 0033:0x4665f9 [ 2485.089937][T23809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2485.109545][T23809] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2485.117976][T23809] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2485.125948][T23809] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2485.133915][T23809] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:20 executing program 2: socketpair(0x2, 0x6, 0x9a000000, &(0x7f0000000000)) 11:05:20 executing program 0: socketpair(0xf, 0x3, 0x2401, &(0x7f0000000040)) 11:05:20 executing program 4: socketpair(0xf, 0x3, 0xc00, &(0x7f0000000040)) [ 2485.141884][T23809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2485.149850][T23809] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:20 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x68}, 0x10}, 0x78) 11:05:21 executing program 5 (fault-call:0 fault-nth:16): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x700}, 0x10}, 0x78) 11:05:21 executing program 0: socketpair(0xf, 0x3, 0x2500, &(0x7f0000000040)) 11:05:21 executing program 2: socketpair(0x2, 0x6, 0x9a010000, &(0x7f0000000000)) 11:05:21 executing program 4: socketpair(0xf, 0x3, 0xc01, &(0x7f0000000040)) 11:05:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa00}, 0x10}, 0x78) 11:05:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c}, 0x10}, 0x78) 11:05:21 executing program 0: socketpair(0xf, 0x3, 0x2501, &(0x7f0000000040)) [ 2485.554206][T23836] FAULT_INJECTION: forcing a failure. [ 2485.554206][T23836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2485.605880][T23836] CPU: 1 PID: 23836 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2485.614334][T23836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2485.624401][T23836] Call Trace: [ 2485.627692][T23836] dump_stack_lvl+0xcd/0x134 [ 2485.632304][T23836] should_fail.cold+0x5/0xa [ 2485.636831][T23836] _copy_to_user+0x2c/0x150 [ 2485.641351][T23836] bpf_verifier_vlog+0x1b2/0x2e0 [ 2485.646316][T23836] __btf_verifier_log+0xbb/0xf0 [ 2485.651192][T23836] ? btf_id_cmp_func+0x90/0x90 [ 2485.655994][T23836] __btf_verifier_log_type+0x55d/0x8e0 [ 2485.661479][T23836] ? btf_var_show+0x380/0x380 [ 2485.666167][T23836] ? __btf_verifier_log+0xbb/0xf0 [ 2485.671196][T23836] ? btf_id_cmp_func+0x90/0x90 [ 2485.675963][T23836] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2485.682204][T23836] ? do_swap+0x132/0x210 [ 2485.686452][T23836] btf_enum_check_meta+0x1d6/0x6a0 [ 2485.691576][T23836] btf_check_all_metas+0x3a6/0xa40 [ 2485.696689][T23836] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2485.702928][T23836] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2485.708040][T23836] btf_new_fd+0x976/0x2450 [ 2485.712453][T23836] ? find_held_lock+0x2d/0x110 [ 2485.717218][T23836] ? __might_fault+0xd3/0x180 [ 2485.721900][T23836] ? lock_downgrade+0x6e0/0x6e0 [ 2485.726749][T23836] ? btf_type_snprintf_show+0x140/0x140 [ 2485.732290][T23836] ? apparmor_capable+0x1d8/0x460 [ 2485.737313][T23836] ? security_capable+0x8f/0xc0 [ 2485.742161][T23836] __sys_bpf+0x1baf/0x5df0 [ 2485.746576][T23836] ? bpf_link_get_from_fd+0x110/0x110 [ 2485.751947][T23836] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2485.757924][T23836] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2485.763909][T23836] ? find_held_lock+0x2d/0x110 [ 2485.768685][T23836] ? trace_hardirqs_on+0x38/0x1c0 [ 2485.773715][T23836] __x64_sys_bpf+0x75/0xb0 [ 2485.778128][T23836] ? syscall_enter_from_user_mode+0x21/0x70 [ 2485.784016][T23836] do_syscall_64+0x35/0xb0 [ 2485.788431][T23836] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2485.794322][T23836] RIP: 0033:0x4665f9 [ 2485.798210][T23836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2485.817809][T23836] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2485.826215][T23836] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2485.834176][T23836] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2485.842151][T23836] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1085}, 0x10}, 0x78) 11:05:21 executing program 2: socketpair(0x2, 0x6, 0x9b000000, &(0x7f0000000000)) 11:05:21 executing program 4: socketpair(0xf, 0x3, 0xd00, &(0x7f0000000040)) [ 2485.850118][T23836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2485.858079][T23836] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x74}, 0x10}, 0x78) 11:05:21 executing program 5 (fault-call:0 fault-nth:17): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:21 executing program 0: socketpair(0xf, 0x3, 0x2600, &(0x7f0000000040)) 11:05:21 executing program 4: socketpair(0xf, 0x3, 0xd01, &(0x7f0000000040)) 11:05:21 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1840}, 0x10}, 0x78) 11:05:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a}, 0x10}, 0x78) 11:05:21 executing program 2: socketpair(0x2, 0x6, 0x9b010000, &(0x7f0000000000)) 11:05:21 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85}, 0x10}, 0x78) [ 2486.224903][T23859] FAULT_INJECTION: forcing a failure. [ 2486.224903][T23859] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:05:21 executing program 0: socketpair(0xf, 0x3, 0x2601, &(0x7f0000000040)) 11:05:21 executing program 4: socketpair(0xf, 0x3, 0xe00, &(0x7f0000000040)) 11:05:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1f00}, 0x10}, 0x78) [ 2486.306920][T23859] CPU: 1 PID: 23859 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2486.315395][T23859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2486.325464][T23859] Call Trace: [ 2486.328756][T23859] dump_stack_lvl+0xcd/0x134 [ 2486.333370][T23859] should_fail.cold+0x5/0xa [ 2486.337893][T23859] _copy_to_user+0x2c/0x150 [ 2486.342415][T23859] bpf_verifier_vlog+0x1b2/0x2e0 [ 2486.347383][T23859] __btf_verifier_log+0xbb/0xf0 [ 2486.352256][T23859] ? btf_id_cmp_func+0x90/0x90 11:05:22 executing program 2: socketpair(0x2, 0x6, 0x9c000000, &(0x7f0000000000)) [ 2486.357063][T23859] __btf_verifier_log_type+0x771/0x8e0 [ 2486.362563][T23859] ? btf_var_show+0x380/0x380 [ 2486.367277][T23859] ? __btf_verifier_log+0xbb/0xf0 [ 2486.372333][T23859] ? btf_id_cmp_func+0x90/0x90 [ 2486.377120][T23859] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2486.383391][T23859] ? do_swap+0x132/0x210 [ 2486.387661][T23859] btf_enum_check_meta+0x544/0x6a0 [ 2486.392810][T23859] btf_check_all_metas+0x3a6/0xa40 [ 2486.397953][T23859] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 11:05:22 executing program 2: socketpair(0x2, 0x6, 0x9c010000, &(0x7f0000000000)) [ 2486.404216][T23859] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2486.409359][T23859] btf_new_fd+0x976/0x2450 [ 2486.413800][T23859] ? find_held_lock+0x2d/0x110 [ 2486.418758][T23859] ? __might_fault+0xd3/0x180 [ 2486.423465][T23859] ? lock_downgrade+0x6e0/0x6e0 [ 2486.428340][T23859] ? btf_type_snprintf_show+0x140/0x140 [ 2486.433910][T23859] ? apparmor_capable+0x1d8/0x460 [ 2486.438964][T23859] ? security_capable+0x8f/0xc0 [ 2486.443855][T23859] __sys_bpf+0x1baf/0x5df0 [ 2486.448305][T23859] ? bpf_link_get_from_fd+0x110/0x110 [ 2486.453713][T23859] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2486.459721][T23859] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2486.465735][T23859] ? find_held_lock+0x2d/0x110 [ 2486.470545][T23859] ? trace_hardirqs_on+0x38/0x1c0 [ 2486.475608][T23859] __x64_sys_bpf+0x75/0xb0 [ 2486.480051][T23859] ? syscall_enter_from_user_mode+0x21/0x70 [ 2486.485968][T23859] do_syscall_64+0x35/0xb0 [ 2486.490410][T23859] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2486.496332][T23859] RIP: 0033:0x4665f9 [ 2486.500250][T23859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2486.519879][T23859] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2486.528316][T23859] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2486.536313][T23859] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2486.544301][T23859] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2486.552288][T23859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2486.560285][T23859] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:22 executing program 5 (fault-call:0 fault-nth:18): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec}, 0x10}, 0x78) 11:05:22 executing program 0: socketpair(0xf, 0x3, 0x2700, &(0x7f0000000040)) 11:05:22 executing program 2: socketpair(0x2, 0x6, 0x9d000000, &(0x7f0000000000)) 11:05:22 executing program 4: socketpair(0xf, 0x3, 0xe01, &(0x7f0000000040)) 11:05:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2000}, 0x10}, 0x78) 11:05:22 executing program 0: socketpair(0xf, 0x3, 0x2701, &(0x7f0000000040)) 11:05:22 executing program 4: socketpair(0xf, 0x3, 0xf00, &(0x7f0000000040)) 11:05:22 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0}, 0x10}, 0x78) [ 2486.874079][T23885] FAULT_INJECTION: forcing a failure. [ 2486.874079][T23885] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:05:22 executing program 2: socketpair(0x2, 0x6, 0x9d010000, &(0x7f0000000000)) [ 2486.925602][T23885] CPU: 1 PID: 23885 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2486.934072][T23885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2486.944147][T23885] Call Trace: [ 2486.947442][T23885] dump_stack_lvl+0xcd/0x134 [ 2486.952057][T23885] should_fail.cold+0x5/0xa [ 2486.956592][T23885] _copy_to_user+0x2c/0x150 [ 2486.961112][T23885] bpf_verifier_vlog+0x1b2/0x2e0 [ 2486.966092][T23885] btf_verifier_log+0x1c8/0x270 [ 2486.970974][T23885] ? btf_free_rcu+0xd0/0xd0 11:05:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2085}, 0x10}, 0x78) [ 2486.975532][T23885] __btf_verifier_log_type+0x4f3/0x8e0 [ 2486.981027][T23885] ? btf_var_show+0x380/0x380 [ 2486.985736][T23885] ? __btf_verifier_log+0xbb/0xf0 [ 2486.990786][T23885] ? btf_id_cmp_func+0x90/0x90 [ 2486.995577][T23885] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2487.001843][T23885] ? do_swap+0x132/0x210 [ 2487.006113][T23885] btf_enum_check_meta+0x544/0x6a0 [ 2487.011264][T23885] btf_check_all_metas+0x3a6/0xa40 [ 2487.016403][T23885] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2487.022670][T23885] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2487.027811][T23885] btf_new_fd+0x976/0x2450 [ 2487.032245][T23885] ? find_held_lock+0x2d/0x110 [ 2487.037031][T23885] ? __might_fault+0xd3/0x180 [ 2487.041746][T23885] ? lock_downgrade+0x6e0/0x6e0 [ 2487.046628][T23885] ? btf_type_snprintf_show+0x140/0x140 [ 2487.052191][T23885] ? apparmor_capable+0x1d8/0x460 [ 2487.057241][T23885] ? security_capable+0x8f/0xc0 [ 2487.062122][T23885] __sys_bpf+0x1baf/0x5df0 [ 2487.066570][T23885] ? bpf_link_get_from_fd+0x110/0x110 11:05:22 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2d03}, 0x10}, 0x78) [ 2487.071971][T23885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2487.077974][T23885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2487.083984][T23885] ? find_held_lock+0x2d/0x110 [ 2487.088791][T23885] ? trace_hardirqs_on+0x38/0x1c0 [ 2487.093840][T23885] __x64_sys_bpf+0x75/0xb0 [ 2487.098283][T23885] ? syscall_enter_from_user_mode+0x21/0x70 [ 2487.104205][T23885] do_syscall_64+0x35/0xb0 [ 2487.108649][T23885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2487.114565][T23885] RIP: 0033:0x4665f9 [ 2487.118474][T23885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.138110][T23885] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2487.146551][T23885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2487.154547][T23885] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2487.162540][T23885] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.170533][T23885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.178529][T23885] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:23 executing program 5 (fault-call:0 fault-nth:19): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:23 executing program 0: socketpair(0xf, 0x3, 0x2800, &(0x7f0000000040)) 11:05:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd}, 0x10}, 0x78) 11:05:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4018}, 0x10}, 0x78) 11:05:23 executing program 4: socketpair(0xf, 0x3, 0xf01, &(0x7f0000000040)) 11:05:23 executing program 2: socketpair(0x2, 0x6, 0x9e000000, &(0x7f0000000000)) 11:05:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x179}, 0x10}, 0x78) 11:05:23 executing program 0: socketpair(0xf, 0x3, 0x2801, &(0x7f0000000040)) 11:05:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4800}, 0x10}, 0x78) 11:05:23 executing program 4: socketpair(0xf, 0x3, 0x1001, &(0x7f0000000040)) [ 2487.510827][T23911] FAULT_INJECTION: forcing a failure. [ 2487.510827][T23911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2487.532744][T23911] CPU: 0 PID: 23911 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2487.541205][T23911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2487.551274][T23911] Call Trace: [ 2487.554566][T23911] dump_stack_lvl+0xcd/0x134 [ 2487.559184][T23911] should_fail.cold+0x5/0xa [ 2487.563722][T23911] _copy_to_user+0x2c/0x150 [ 2487.568250][T23911] bpf_verifier_vlog+0x1b2/0x2e0 [ 2487.573265][T23911] __btf_verifier_log+0xbb/0xf0 [ 2487.578146][T23911] ? btf_id_cmp_func+0x90/0x90 [ 2487.582953][T23911] __btf_verifier_log_type+0x61a/0x8e0 [ 2487.588453][T23911] ? btf_var_show+0x380/0x380 [ 2487.593164][T23911] ? __btf_verifier_log+0xbb/0xf0 [ 2487.598217][T23911] ? btf_id_cmp_func+0x90/0x90 [ 2487.603011][T23911] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2487.609277][T23911] ? do_swap+0x132/0x210 [ 2487.613546][T23911] btf_enum_check_meta+0x544/0x6a0 [ 2487.618696][T23911] btf_check_all_metas+0x3a6/0xa40 [ 2487.623837][T23911] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2487.630101][T23911] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2487.635242][T23911] btf_new_fd+0x976/0x2450 [ 2487.639679][T23911] ? find_held_lock+0x2d/0x110 [ 2487.644461][T23911] ? __might_fault+0xd3/0x180 [ 2487.649166][T23911] ? lock_downgrade+0x6e0/0x6e0 [ 2487.654052][T23911] ? btf_type_snprintf_show+0x140/0x140 11:05:23 executing program 4: socketpair(0xf, 0x3, 0x1100, &(0x7f0000000040)) [ 2487.659623][T23911] ? apparmor_capable+0x1d8/0x460 [ 2487.664852][T23911] ? security_capable+0x8f/0xc0 [ 2487.669849][T23911] __sys_bpf+0x1baf/0x5df0 [ 2487.674301][T23911] ? bpf_link_get_from_fd+0x110/0x110 [ 2487.679712][T23911] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2487.685717][T23911] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2487.691732][T23911] ? find_held_lock+0x2d/0x110 [ 2487.696540][T23911] ? trace_hardirqs_on+0x38/0x1c0 [ 2487.701592][T23911] __x64_sys_bpf+0x75/0xb0 [ 2487.706032][T23911] ? syscall_enter_from_user_mode+0x21/0x70 11:05:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c00}, 0x10}, 0x78) [ 2487.711947][T23911] do_syscall_64+0x35/0xb0 [ 2487.716390][T23911] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2487.722306][T23911] RIP: 0033:0x4665f9 [ 2487.726216][T23911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2487.745841][T23911] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2487.754274][T23911] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2487.762263][T23911] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2487.770254][T23911] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2487.778244][T23911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2487.786230][T23911] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:23 executing program 5 (fault-call:0 fault-nth:20): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:23 executing program 2: socketpair(0x2, 0x6, 0x9e010000, &(0x7f0000000000)) 11:05:23 executing program 4: socketpair(0xf, 0x3, 0x1101, &(0x7f0000000040)) 11:05:23 executing program 0: socketpair(0xf, 0x3, 0x2900, &(0x7f0000000040)) 11:05:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1b5}, 0x10}, 0x78) 11:05:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5103}, 0x10}, 0x78) 11:05:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x295}, 0x10}, 0x78) 11:05:23 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d00}, 0x10}, 0x78) 11:05:23 executing program 2: socketpair(0x2, 0x6, 0x9f000000, &(0x7f0000000000)) 11:05:23 executing program 4: socketpair(0xf, 0x3, 0x1200, &(0x7f0000000040)) [ 2488.125594][T23935] FAULT_INJECTION: forcing a failure. [ 2488.125594][T23935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2488.199255][T23935] CPU: 1 PID: 23935 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2488.207730][T23935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2488.217900][T23935] Call Trace: [ 2488.221185][T23935] dump_stack_lvl+0xcd/0x134 [ 2488.225793][T23935] should_fail.cold+0x5/0xa [ 2488.230330][T23935] _copy_to_user+0x2c/0x150 [ 2488.234855][T23935] bpf_verifier_vlog+0x1b2/0x2e0 [ 2488.239820][T23935] __btf_verifier_log_type+0x649/0x8e0 [ 2488.245317][T23935] ? btf_var_show+0x380/0x380 [ 2488.250017][T23935] ? __btf_verifier_log+0xbb/0xf0 [ 2488.255049][T23935] ? btf_id_cmp_func+0x90/0x90 [ 2488.259815][T23935] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2488.266061][T23935] ? do_swap+0x132/0x210 [ 2488.270307][T23935] btf_enum_check_meta+0x544/0x6a0 [ 2488.275431][T23935] btf_check_all_metas+0x3a6/0xa40 [ 2488.280547][T23935] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2488.286789][T23935] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2488.291908][T23935] btf_new_fd+0x976/0x2450 [ 2488.296317][T23935] ? find_held_lock+0x2d/0x110 [ 2488.301081][T23935] ? __might_fault+0xd3/0x180 [ 2488.305761][T23935] ? lock_downgrade+0x6e0/0x6e0 [ 2488.310612][T23935] ? btf_type_snprintf_show+0x140/0x140 [ 2488.316155][T23935] ? apparmor_capable+0x1d8/0x460 [ 2488.321182][T23935] ? security_capable+0x8f/0xc0 [ 2488.326039][T23935] __sys_bpf+0x1baf/0x5df0 [ 2488.330461][T23935] ? bpf_link_get_from_fd+0x110/0x110 [ 2488.335842][T23935] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2488.341828][T23935] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2488.347812][T23935] ? find_held_lock+0x2d/0x110 [ 2488.352593][T23935] ? trace_hardirqs_on+0x38/0x1c0 [ 2488.357617][T23935] __x64_sys_bpf+0x75/0xb0 [ 2488.362031][T23935] ? syscall_enter_from_user_mode+0x21/0x70 [ 2488.367920][T23935] do_syscall_64+0x35/0xb0 [ 2488.372370][T23935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2488.378260][T23935] RIP: 0033:0x4665f9 11:05:24 executing program 0: socketpair(0xf, 0x3, 0x2901, &(0x7f0000000040)) [ 2488.382148][T23935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.401748][T23935] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2488.410161][T23935] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2488.418140][T23935] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 [ 2488.426116][T23935] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2488.434094][T23935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2488.442069][T23935] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6800}, 0x10}, 0x78) 11:05:24 executing program 5 (fault-call:0 fault-nth:21): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x300}, 0x10}, 0x78) 11:05:24 executing program 4: socketpair(0xf, 0x3, 0x1201, &(0x7f0000000040)) 11:05:24 executing program 2: socketpair(0x2, 0x6, 0x9f010000, &(0x7f0000000000)) 11:05:24 executing program 0: socketpair(0xf, 0x3, 0x2a00, &(0x7f0000000040)) 11:05:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c00}, 0x10}, 0x78) [ 2488.731452][T23952] FAULT_INJECTION: forcing a failure. [ 2488.731452][T23952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2488.773349][T23952] CPU: 1 PID: 23952 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2488.781825][T23952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2488.791898][T23952] Call Trace: [ 2488.795195][T23952] dump_stack_lvl+0xcd/0x134 [ 2488.799813][T23952] should_fail.cold+0x5/0xa [ 2488.804347][T23952] _copy_to_user+0x2c/0x150 [ 2488.808879][T23952] bpf_verifier_vlog+0x1b2/0x2e0 [ 2488.813849][T23952] __btf_verifier_log+0xbb/0xf0 [ 2488.818727][T23952] ? btf_id_cmp_func+0x90/0x90 [ 2488.823549][T23952] ? _copy_to_user+0xdc/0x150 [ 2488.828248][T23952] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2488.834521][T23952] __btf_verifier_log_type+0x55d/0x8e0 [ 2488.840017][T23952] ? btf_var_show+0x380/0x380 [ 2488.844733][T23952] ? __btf_verifier_log+0xbb/0xf0 [ 2488.849782][T23952] ? btf_id_cmp_func+0x90/0x90 [ 2488.854569][T23952] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2488.860836][T23952] ? do_swap+0x132/0x210 [ 2488.865105][T23952] btf_enum_check_meta+0x544/0x6a0 [ 2488.870251][T23952] btf_check_all_metas+0x3a6/0xa40 [ 2488.875378][T23952] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2488.881626][T23952] ? btf_parse_str_sec+0x1e8/0x2e0 [ 2488.886750][T23952] btf_new_fd+0x976/0x2450 [ 2488.891166][T23952] ? find_held_lock+0x2d/0x110 [ 2488.895934][T23952] ? __might_fault+0xd3/0x180 [ 2488.900613][T23952] ? lock_downgrade+0x6e0/0x6e0 [ 2488.905473][T23952] ? btf_type_snprintf_show+0x140/0x140 [ 2488.911020][T23952] ? apparmor_capable+0x1d8/0x460 [ 2488.916054][T23952] ? security_capable+0x8f/0xc0 [ 2488.920917][T23952] __sys_bpf+0x1baf/0x5df0 [ 2488.925346][T23952] ? bpf_link_get_from_fd+0x110/0x110 [ 2488.930749][T23952] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2488.936732][T23952] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2488.942737][T23952] ? find_held_lock+0x2d/0x110 [ 2488.947524][T23952] ? trace_hardirqs_on+0x38/0x1c0 [ 2488.952554][T23952] __x64_sys_bpf+0x75/0xb0 [ 2488.956975][T23952] ? syscall_enter_from_user_mode+0x21/0x70 [ 2488.962871][T23952] do_syscall_64+0x35/0xb0 [ 2488.967293][T23952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2488.973192][T23952] RIP: 0033:0x4665f9 [ 2488.977088][T23952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2488.996692][T23952] RSP: 002b:00007fa7fbd3f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2489.005103][T23952] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2489.013078][T23952] RDX: 0000000000000020 RSI: 0000000020001540 RDI: 0000000000000012 11:05:24 executing program 2: socketpair(0x2, 0x6, 0xa0000000, &(0x7f0000000000)) 11:05:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x32d}, 0x10}, 0x78) [ 2489.021059][T23952] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2489.029038][T23952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2489.037005][T23952] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:24 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7400}, 0x10}, 0x78) 11:05:24 executing program 4: socketpair(0xf, 0x3, 0x1300, &(0x7f0000000040)) 11:05:24 executing program 0: socketpair(0xf, 0x3, 0x2a01, &(0x7f0000000040)) 11:05:24 executing program 5 (fault-call:0 fault-nth:22): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:24 executing program 2: socketpair(0x2, 0x6, 0xa0010000, &(0x7f0000000000)) 11:05:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x351}, 0x10}, 0x78) 11:05:25 executing program 4: socketpair(0xf, 0x3, 0x1301, &(0x7f0000000040)) [ 2489.401551][T23972] FAULT_INJECTION: forcing a failure. [ 2489.401551][T23972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2489.442627][T23972] CPU: 1 PID: 23972 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 2489.451091][T23972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2489.461171][T23972] Call Trace: [ 2489.464481][T23972] dump_stack_lvl+0xcd/0x134 [ 2489.469106][T23972] should_fail.cold+0x5/0xa [ 2489.473733][T23972] _copy_to_user+0x2c/0x150 [ 2489.478263][T23972] simple_read_from_buffer+0xcc/0x160 [ 2489.483676][T23972] proc_fail_nth_read+0x187/0x220 11:05:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7901}, 0x10}, 0x78) 11:05:25 executing program 2: socketpair(0x2, 0x6, 0xa1000000, &(0x7f0000000000)) [ 2489.488732][T23972] ? proc_fault_inject_read+0x220/0x220 [ 2489.494310][T23972] ? security_file_permission+0xab/0xd0 [ 2489.499887][T23972] ? proc_fault_inject_read+0x220/0x220 [ 2489.505459][T23972] vfs_read+0x1b5/0x600 [ 2489.509661][T23972] ksys_read+0x12d/0x250 [ 2489.513930][T23972] ? vfs_write+0xae0/0xae0 [ 2489.518372][T23972] ? syscall_enter_from_user_mode+0x21/0x70 [ 2489.524304][T23972] do_syscall_64+0x35/0xb0 [ 2489.528746][T23972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2489.534660][T23972] RIP: 0033:0x41937c [ 2489.538570][T23972] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2489.558203][T23972] RSP: 002b:00007fa7fbd3f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2489.566648][T23972] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 2489.574642][T23972] RDX: 000000000000000f RSI: 00007fa7fbd3f1e0 RDI: 0000000000000003 [ 2489.582633][T23972] RBP: 00007fa7fbd3f1d0 R08: 0000000000000000 R09: 0000000000000000 11:05:25 executing program 2: socketpair(0x2, 0x6, 0xa1010000, &(0x7f0000000000)) 11:05:25 executing program 0: socketpair(0xf, 0x3, 0x2b00, &(0x7f0000000040)) [ 2489.590625][T23972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2489.598610][T23972] R13: 00007ffec6ee9b2f R14: 00007fa7fbd3f300 R15: 0000000000022000 11:05:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x390}, 0x10}, 0x78) 11:05:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a00}, 0x10}, 0x78) 11:05:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:25 executing program 4: socketpair(0xf, 0x3, 0x1400, &(0x7f0000000040)) 11:05:25 executing program 2: socketpair(0x2, 0x6, 0xa2000000, &(0x7f0000000000)) 11:05:25 executing program 0: socketpair(0xf, 0x3, 0x2b01, &(0x7f0000000040)) 11:05:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3b9}, 0x10}, 0x78) 11:05:25 executing program 4: socketpair(0xf, 0x3, 0x1401, &(0x7f0000000040)) 11:05:25 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8100}, 0x10}, 0x78) 11:05:25 executing program 0: socketpair(0xf, 0x3, 0x2c00, &(0x7f0000000040)) 11:05:25 executing program 2: socketpair(0x2, 0x6, 0xa2010000, &(0x7f0000000000)) 11:05:25 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3cd}, 0x10}, 0x78) 11:05:25 executing program 4: socketpair(0xf, 0x3, 0x1500, &(0x7f0000000040)) 11:05:25 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:25 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8500}, 0x10}, 0x78) 11:05:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3f9}, 0x10}, 0x78) 11:05:26 executing program 2: socketpair(0x2, 0x6, 0xa3000000, &(0x7f0000000000)) 11:05:26 executing program 0: socketpair(0xf, 0x3, 0x2c01, &(0x7f0000000040)) 11:05:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8510}, 0x10}, 0x78) 11:05:26 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:26 executing program 4: socketpair(0xf, 0x3, 0x1501, &(0x7f0000000040)) 11:05:26 executing program 2: socketpair(0x2, 0x6, 0xa3010000, &(0x7f0000000000)) 11:05:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x500}, 0x10}, 0x78) 11:05:26 executing program 0: socketpair(0xf, 0x3, 0x2d00, &(0x7f0000000040)) 11:05:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8520}, 0x10}, 0x78) 11:05:26 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:26 executing program 4: socketpair(0xf, 0x3, 0x1600, &(0x7f0000000040)) 11:05:26 executing program 2: socketpair(0x2, 0x6, 0xa4000000, &(0x7f0000000000)) 11:05:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x600}, 0x10}, 0x78) 11:05:26 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:26 executing program 0: socketpair(0xf, 0x3, 0x2d01, &(0x7f0000000040)) 11:05:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x9003}, 0x10}, 0x78) 11:05:26 executing program 4: socketpair(0xf, 0x3, 0x1601, &(0x7f0000000040)) 11:05:26 executing program 2: socketpair(0x2, 0x6, 0xa4010000, &(0x7f0000000000)) 11:05:26 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:26 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x700}, 0x10}, 0x78) 11:05:26 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x9502}, 0x10}, 0x78) 11:05:26 executing program 0: socketpair(0xf, 0x3, 0x2e00, &(0x7f0000000040)) 11:05:26 executing program 2: socketpair(0x2, 0x6, 0xa5000000, &(0x7f0000000000)) 11:05:26 executing program 4: socketpair(0xf, 0x3, 0x1700, &(0x7f0000000040)) 11:05:27 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb501}, 0x10}, 0x78) 11:05:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa00}, 0x10}, 0x78) 11:05:27 executing program 0: socketpair(0xf, 0x3, 0x2e01, &(0x7f0000000040)) 11:05:27 executing program 2: socketpair(0x2, 0x6, 0xa5010000, &(0x7f0000000000)) 11:05:27 executing program 4: socketpair(0xf, 0x3, 0x1701, &(0x7f0000000040)) 11:05:27 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb903}, 0x10}, 0x78) 11:05:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1085}, 0x10}, 0x78) 11:05:27 executing program 4: socketpair(0xf, 0x3, 0x1800, &(0x7f0000000040)) 11:05:27 executing program 2: socketpair(0x2, 0x6, 0xa6000000, &(0x7f0000000000)) 11:05:27 executing program 0: socketpair(0xf, 0x3, 0x2f00, &(0x7f0000000040)) 11:05:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xcd03}, 0x10}, 0x78) 11:05:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1840}, 0x10}, 0x78) 11:05:27 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:27 executing program 4: socketpair(0xf, 0x3, 0x1801, &(0x7f0000000040)) 11:05:27 executing program 2: socketpair(0x2, 0x6, 0xa6010000, &(0x7f0000000000)) 11:05:27 executing program 0: socketpair(0xf, 0x3, 0x2f01, &(0x7f0000000040)) 11:05:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec00}, 0x10}, 0x78) 11:05:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1f00}, 0x10}, 0x78) 11:05:27 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:27 executing program 4: socketpair(0xf, 0x3, 0x1900, &(0x7f0000000040)) 11:05:27 executing program 2: socketpair(0x2, 0x6, 0xa7000000, &(0x7f0000000000)) 11:05:27 executing program 0: socketpair(0xf, 0x3, 0x3000, &(0x7f0000000040)) 11:05:27 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf000}, 0x10}, 0x78) 11:05:27 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2000}, 0x10}, 0x78) 11:05:27 executing program 4: socketpair(0xf, 0x3, 0x1901, &(0x7f0000000040)) 11:05:27 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:28 executing program 0: socketpair(0xf, 0x3, 0x3001, &(0x7f0000000040)) 11:05:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0ff}, 0x10}, 0x78) 11:05:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2085}, 0x10}, 0x78) 11:05:28 executing program 2: socketpair(0x2, 0x6, 0xa7010000, &(0x7f0000000000)) 11:05:28 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:28 executing program 4: socketpair(0xf, 0x3, 0x1a00, &(0x7f0000000040)) 11:05:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2d03}, 0x10}, 0x78) 11:05:28 executing program 2: socketpair(0x2, 0x6, 0xa8000000, &(0x7f0000000000)) 11:05:28 executing program 0: socketpair(0xf, 0x3, 0x3100, &(0x7f0000000040)) 11:05:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf903}, 0x10}, 0x78) 11:05:28 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:28 executing program 4: socketpair(0xf, 0x3, 0x1a01, &(0x7f0000000040)) 11:05:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4018}, 0x10}, 0x78) 11:05:28 executing program 0: socketpair(0xf, 0x3, 0x3101, &(0x7f0000000040)) 11:05:28 executing program 2: socketpair(0x2, 0x6, 0xa8010000, &(0x7f0000000000)) 11:05:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd00}, 0x10}, 0x78) 11:05:28 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:28 executing program 4: socketpair(0xf, 0x3, 0x1b00, &(0x7f0000000040)) 11:05:28 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4800}, 0x10}, 0x78) 11:05:28 executing program 2: socketpair(0x2, 0x6, 0xa9000000, &(0x7f0000000000)) 11:05:28 executing program 0: socketpair(0xf, 0x3, 0x3200, &(0x7f0000000040)) 11:05:28 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:28 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xff00}, 0x10}, 0x78) 11:05:29 executing program 4: socketpair(0xf, 0x3, 0x1b01, &(0x7f0000000040)) 11:05:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c00}, 0x10}, 0x78) 11:05:29 executing program 2: socketpair(0x2, 0x6, 0xa9010000, &(0x7f0000000000)) 11:05:29 executing program 0: socketpair(0xf, 0x3, 0x3201, &(0x7f0000000040)) 11:05:29 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1a23fe}, 0x10}, 0x78) 11:05:29 executing program 4: socketpair(0xf, 0x3, 0x1c00, &(0x7f0000000040)) 11:05:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5103}, 0x10}, 0x78) 11:05:29 executing program 2: socketpair(0x2, 0x6, 0xaa000000, &(0x7f0000000000)) 11:05:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x200000}, 0x10}, 0x78) 11:05:29 executing program 0: socketpair(0xf, 0x3, 0x3300, &(0x7f0000000040)) 11:05:29 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:29 executing program 4: socketpair(0xf, 0x3, 0x1c01, &(0x7f0000000040)) 11:05:29 executing program 2: socketpair(0x2, 0x6, 0xaa010000, &(0x7f0000000000)) 11:05:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d00}, 0x10}, 0x78) 11:05:29 executing program 0: socketpair(0xf, 0x3, 0x3301, &(0x7f0000000040)) 11:05:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0ffff}, 0x10}, 0x78) 11:05:29 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:29 executing program 4: socketpair(0xf, 0x3, 0x1d00, &(0x7f0000000040)) 11:05:29 executing program 2: socketpair(0x2, 0x6, 0xab000000, &(0x7f0000000000)) 11:05:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6800}, 0x10}, 0x78) 11:05:29 executing program 0: socketpair(0xf, 0x3, 0x3400, &(0x7f0000000040)) 11:05:29 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1000000}, 0x10}, 0x78) 11:05:29 executing program 2: socketpair(0x2, 0x6, 0xab010000, &(0x7f0000000000)) 11:05:29 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c00}, 0x10}, 0x78) 11:05:29 executing program 4: socketpair(0xf, 0x3, 0x1d01, &(0x7f0000000040)) 11:05:29 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:29 executing program 0: socketpair(0xf, 0x3, 0x3401, &(0x7f0000000040)) 11:05:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2000000}, 0x10}, 0x78) 11:05:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7400}, 0x10}, 0x78) 11:05:30 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:30 executing program 4: socketpair(0xf, 0x3, 0x1e00, &(0x7f0000000040)) 11:05:30 executing program 2: socketpair(0x2, 0x6, 0xac000000, &(0x7f0000000000)) 11:05:30 executing program 0: socketpair(0xf, 0x3, 0x3500, &(0x7f0000000040)) 11:05:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7901}, 0x10}, 0x78) 11:05:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3000000}, 0x10}, 0x78) 11:05:30 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:30 executing program 4: socketpair(0xf, 0x3, 0x1e01, &(0x7f0000000040)) 11:05:30 executing program 0: socketpair(0xf, 0x3, 0x3501, &(0x7f0000000040)) 11:05:30 executing program 2: socketpair(0x2, 0x6, 0xac010000, &(0x7f0000000000)) 11:05:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a00}, 0x10}, 0x78) 11:05:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4000000}, 0x10}, 0x78) 11:05:30 executing program 0: socketpair(0xf, 0x3, 0x3600, &(0x7f0000000040)) 11:05:30 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:30 executing program 4: socketpair(0xf, 0x3, 0x1f00, &(0x7f0000000040)) 11:05:30 executing program 2: socketpair(0x2, 0x6, 0xad000000, &(0x7f0000000000)) 11:05:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5000000}, 0x10}, 0x78) 11:05:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8100}, 0x10}, 0x78) 11:05:30 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:30 executing program 0: socketpair(0xf, 0x3, 0x3601, &(0x7f0000000040)) 11:05:30 executing program 4: socketpair(0xf, 0x3, 0x1f01, &(0x7f0000000040)) 11:05:30 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:30 executing program 2: socketpair(0x2, 0x6, 0xad010000, &(0x7f0000000000)) 11:05:30 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:30 executing program 0: socketpair(0xf, 0x3, 0x3700, &(0x7f0000000040)) 11:05:30 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8500}, 0x10}, 0x78) 11:05:31 executing program 4: socketpair(0xf, 0x3, 0x2000, &(0x7f0000000040)) 11:05:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7000000}, 0x10}, 0x78) 11:05:31 executing program 2: socketpair(0x2, 0x6, 0xae000000, &(0x7f0000000000)) 11:05:31 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8510}, 0x10}, 0x78) 11:05:31 executing program 4: socketpair(0xf, 0x3, 0x2001, &(0x7f0000000040)) 11:05:31 executing program 0: socketpair(0xf, 0x3, 0x3701, &(0x7f0000000040)) 11:05:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8000000}, 0x10}, 0x78) 11:05:31 executing program 2: socketpair(0x2, 0x6, 0xae010000, &(0x7f0000000000)) 11:05:31 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:31 executing program 0: socketpair(0xf, 0x3, 0x3800, &(0x7f0000000040)) 11:05:31 executing program 4: socketpair(0xf, 0x3, 0x2100, &(0x7f0000000040)) 11:05:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8520}, 0x10}, 0x78) 11:05:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa000000}, 0x10}, 0x78) 11:05:31 executing program 2: socketpair(0x2, 0x6, 0xaf000000, &(0x7f0000000000)) 11:05:31 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:31 executing program 0: socketpair(0xf, 0x3, 0x3801, &(0x7f0000000040)) 11:05:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x18400000}, 0x10}, 0x78) 11:05:31 executing program 4: socketpair(0xf, 0x3, 0x2101, &(0x7f0000000040)) 11:05:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x9003}, 0x10}, 0x78) 11:05:31 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:31 executing program 2: socketpair(0x2, 0x6, 0xaf010000, &(0x7f0000000000)) 11:05:31 executing program 0: socketpair(0xf, 0x3, 0x3900, &(0x7f0000000040)) 11:05:31 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1f000000}, 0x10}, 0x78) 11:05:31 executing program 4: socketpair(0xf, 0x3, 0x2200, &(0x7f0000000040)) 11:05:31 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:31 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x9502}, 0x10}, 0x78) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb0000000, &(0x7f0000000000)) 11:05:32 executing program 0: socketpair(0xf, 0x3, 0x3901, &(0x7f0000000040)) 11:05:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2d030000}, 0x10}, 0x78) 11:05:32 executing program 4: socketpair(0xf, 0x3, 0x2201, &(0x7f0000000040)) 11:05:32 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb501}, 0x10}, 0x78) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb0010000, &(0x7f0000000000)) 11:05:32 executing program 0: socketpair(0xf, 0x3, 0x3a00, &(0x7f0000000040)) 11:05:32 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x48000000}, 0x10}, 0x78) 11:05:32 executing program 4: socketpair(0xf, 0x3, 0x2300, &(0x7f0000000040)) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb1000000, &(0x7f0000000000)) 11:05:32 executing program 0: socketpair(0xf, 0x3, 0x3a01, &(0x7f0000000040)) 11:05:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb903}, 0x10}, 0x78) 11:05:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:32 executing program 4: socketpair(0xf, 0x3, 0x2301, &(0x7f0000000040)) 11:05:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c000000}, 0x10}, 0x78) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb1010000, &(0x7f0000000000)) 11:05:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xcd03}, 0x10}, 0x78) 11:05:32 executing program 4: socketpair(0xf, 0x3, 0x2400, &(0x7f0000000040)) 11:05:32 executing program 0: socketpair(0xf, 0x3, 0x3b00, &(0x7f0000000040)) 11:05:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x51030000}, 0x10}, 0x78) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb2000000, &(0x7f0000000000)) 11:05:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:32 executing program 0: socketpair(0xf, 0x3, 0x3b01, &(0x7f0000000040)) 11:05:32 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec00}, 0x10}, 0x78) 11:05:32 executing program 4: socketpair(0xf, 0x3, 0x2401, &(0x7f0000000040)) 11:05:32 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d000000}, 0x10}, 0x78) 11:05:32 executing program 2: socketpair(0x2, 0x6, 0xb2010000, &(0x7f0000000000)) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3c00, &(0x7f0000000040)) 11:05:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf000}, 0x10}, 0x78) 11:05:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x68000000}, 0x10}, 0x78) 11:05:33 executing program 4: socketpair(0xf, 0x3, 0x2500, &(0x7f0000000040)) 11:05:33 executing program 2: socketpair(0x2, 0x6, 0xb3000000, &(0x7f0000000000)) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3c01, &(0x7f0000000040)) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 4: socketpair(0xf, 0x3, 0x2501, &(0x7f0000000040)) 11:05:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0ff}, 0x10}, 0x78) 11:05:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c000000}, 0x10}, 0x78) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 2: socketpair(0x2, 0x6, 0xb3010000, &(0x7f0000000000)) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3d00, &(0x7f0000000040)) 11:05:33 executing program 4: socketpair(0xf, 0x3, 0x2600, &(0x7f0000000040)) 11:05:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf903}, 0x10}, 0x78) 11:05:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x74000000}, 0x10}, 0x78) 11:05:33 executing program 2: socketpair(0x2, 0x6, 0xb4000000, &(0x7f0000000000)) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3d01, &(0x7f0000000040)) 11:05:33 executing program 4: socketpair(0xf, 0x3, 0x2601, &(0x7f0000000040)) 11:05:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd00}, 0x10}, 0x78) 11:05:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x79010000}, 0x10}, 0x78) 11:05:33 executing program 2: socketpair(0x2, 0x6, 0xb4010000, &(0x7f0000000000)) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3e00, &(0x7f0000000040)) 11:05:33 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xff00}, 0x10}, 0x78) 11:05:33 executing program 4: socketpair(0xf, 0x3, 0x2700, &(0x7f0000000040)) 11:05:33 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a000000}, 0x10}, 0x78) 11:05:33 executing program 2: socketpair(0x2, 0x6, 0xb5000000, &(0x7f0000000000)) 11:05:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:33 executing program 0: socketpair(0xf, 0x3, 0x3e01, &(0x7f0000000040)) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2701, &(0x7f0000000040)) 11:05:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1a23fe}, 0x10}, 0x78) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb5010000, &(0x7f0000000000)) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x81000000}, 0x10}, 0x78) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85000000}, 0x10}, 0x78) 11:05:34 executing program 0: socketpair(0xf, 0x3, 0x3f00, &(0x7f0000000040)) 11:05:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x200000}, 0x10}, 0x78) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2800, &(0x7f0000000040)) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb6000000, &(0x7f0000000000)) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85100000}, 0x10}, 0x78) 11:05:34 executing program 0: socketpair(0xf, 0x3, 0x3f01, &(0x7f0000000040)) 11:05:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf0ffff}, 0x10}, 0x78) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2801, &(0x7f0000000040)) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb6010000, &(0x7f0000000000)) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85200000}, 0x10}, 0x78) 11:05:34 executing program 0: socketpair(0xf, 0x3, 0x4000, &(0x7f0000000040)) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb7000000, &(0x7f0000000000)) 11:05:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1000000}, 0x10}, 0x78) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85ffffff}, 0x10}, 0x78) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2900, &(0x7f0000000040)) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb7010000, &(0x7f0000000000)) 11:05:34 executing program 0: socketpair(0xf, 0x3, 0x4001, &(0x7f0000000040)) 11:05:34 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2000000}, 0x10}, 0x78) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2901, &(0x7f0000000040)) 11:05:34 executing program 2: socketpair(0x2, 0x6, 0xb8000000, &(0x7f0000000000)) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x90030000}, 0x10}, 0x78) 11:05:34 executing program 0: socketpair(0xf, 0x3, 0x4100, &(0x7f0000000040)) 11:05:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x14, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:34 executing program 4: socketpair(0xf, 0x3, 0x2a00, &(0x7f0000000040)) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x3000000}, 0x10}, 0x78) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xb8010000, &(0x7f0000000000)) 11:05:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x95020000}, 0x10}, 0x78) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4101, &(0x7f0000000040)) 11:05:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x16, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xb9000000, &(0x7f0000000000)) 11:05:35 executing program 4: socketpair(0xf, 0x3, 0x2a01, &(0x7f0000000040)) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4000000}, 0x10}, 0x78) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4200, &(0x7f0000000040)) 11:05:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb5010000}, 0x10}, 0x78) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xb9010000, &(0x7f0000000000)) 11:05:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5000000}, 0x10}, 0x78) 11:05:35 executing program 4: socketpair(0xf, 0x3, 0x2b00, &(0x7f0000000040)) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4201, &(0x7f0000000040)) 11:05:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb9030000}, 0x10}, 0x78) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xba000000, &(0x7f0000000000)) 11:05:35 executing program 4: socketpair(0xf, 0x3, 0x2b01, &(0x7f0000000040)) 11:05:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6000000}, 0x10}, 0x78) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4300, &(0x7f0000000040)) 11:05:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xcd030000}, 0x10}, 0x78) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xba010000, &(0x7f0000000000)) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7000000}, 0x10}, 0x78) 11:05:35 executing program 4: socketpair(0xf, 0x3, 0x2c00, &(0x7f0000000040)) 11:05:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4301, &(0x7f0000000040)) 11:05:35 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec000000}, 0x10}, 0x78) 11:05:35 executing program 2: socketpair(0x2, 0x6, 0xbb000000, &(0x7f0000000000)) 11:05:35 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x8000000}, 0x10}, 0x78) 11:05:35 executing program 4: socketpair(0xf, 0x3, 0x2c01, &(0x7f0000000040)) 11:05:35 executing program 0: socketpair(0xf, 0x3, 0x4400, &(0x7f0000000040)) 11:05:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xa000000}, 0x10}, 0x78) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf9030000}, 0x10}, 0x78) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbb010000, &(0x7f0000000000)) 11:05:36 executing program 4: socketpair(0xf, 0x3, 0x2d00, &(0x7f0000000040)) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x18400000}, 0x10}, 0x78) 11:05:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbc000000, &(0x7f0000000000)) 11:05:36 executing program 0: socketpair(0xf, 0x3, 0x4401, &(0x7f0000000040)) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd000000}, 0x10}, 0x78) 11:05:36 executing program 4: socketpair(0xf, 0x3, 0x2d01, &(0x7f0000000040)) 11:05:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x1f000000}, 0x10}, 0x78) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbc010000, &(0x7f0000000000)) 11:05:36 executing program 0: socketpair(0xf, 0x3, 0x4500, &(0x7f0000000040)) 11:05:36 executing program 4: socketpair(0xf, 0x3, 0x2e00, &(0x7f0000000040)) 11:05:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0xfe, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfe231a00}, 0x10}, 0x78) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x2d030000}, 0x10}, 0x78) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbd000000, &(0x7f0000000000)) 11:05:36 executing program 0: socketpair(0xf, 0x3, 0x4501, &(0x7f0000000040)) 11:05:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 4: socketpair(0xf, 0x3, 0x2e01, &(0x7f0000000040)) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xff000000}, 0x10}, 0x78) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbd010000, &(0x7f0000000000)) 11:05:36 executing program 0: socketpair(0xf, 0x3, 0x4600, &(0x7f0000000040)) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x48000000}, 0x10}, 0x78) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfff00000}, 0x10}, 0x78) 11:05:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:36 executing program 4: socketpair(0xf, 0x3, 0x2f00, &(0x7f0000000040)) 11:05:36 executing program 0: socketpair(0xf, 0x3, 0x4601, &(0x7f0000000040)) 11:05:36 executing program 2: socketpair(0x2, 0x6, 0xbe000000, &(0x7f0000000000)) 11:05:36 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x4c000000}, 0x10}, 0x78) 11:05:36 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfffff000}, 0x10}, 0x78) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x2e, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:37 executing program 4: socketpair(0xf, 0x3, 0x2f01, &(0x7f0000000040)) 11:05:37 executing program 0: socketpair(0xf, 0x3, 0x4700, &(0x7f0000000040)) 11:05:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xffffff85}, 0x10}, 0x78) 11:05:37 executing program 2: socketpair(0x2, 0x6, 0xbe010000, &(0x7f0000000000)) 11:05:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x51030000}, 0x10}, 0x78) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:37 executing program 4: socketpair(0xf, 0x3, 0x3000, &(0x7f0000000040)) 11:05:37 executing program 0: socketpair(0xf, 0x3, 0x4701, &(0x7f0000000040)) 11:05:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xffffffff}, 0x10}, 0x78) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:37 executing program 2: socketpair(0x2, 0x6, 0xbf000000, &(0x7f0000000000)) 11:05:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x5d000000}, 0x10}, 0x78) 11:05:37 executing program 4: socketpair(0xf, 0x3, 0x3001, &(0x7f0000000040)) 11:05:37 executing program 0: socketpair(0xf, 0x3, 0x4800, &(0x7f0000000040)) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x2}, 0x78) 11:05:37 executing program 2: socketpair(0x2, 0x6, 0xbf010000, &(0x7f0000000000)) 11:05:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x68000000}, 0x10}, 0x78) 11:05:37 executing program 4: socketpair(0xf, 0x3, 0x3100, &(0x7f0000000040)) 11:05:37 executing program 0: socketpair(0xf, 0x3, 0x4801, &(0x7f0000000040)) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:37 executing program 2: socketpair(0x2, 0x6, 0xc0000000, &(0x7f0000000000)) 11:05:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x3}, 0x78) 11:05:37 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x6c000000}, 0x10}, 0x78) 11:05:37 executing program 4: socketpair(0xf, 0x3, 0x3101, &(0x7f0000000040)) 11:05:37 executing program 0: socketpair(0xf, 0x3, 0x4900, &(0x7f0000000040)) 11:05:37 executing program 2: socketpair(0x2, 0x6, 0xc0010000, &(0x7f0000000000)) 11:05:37 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x4}, 0x78) 11:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x74000000}, 0x10}, 0x78) 11:05:38 executing program 0: socketpair(0xf, 0x3, 0x4901, &(0x7f0000000040)) 11:05:38 executing program 4: socketpair(0xf, 0x3, 0x3200, &(0x7f0000000040)) 11:05:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x5}, 0x78) 11:05:38 executing program 2: socketpair(0x2, 0x6, 0xc1000000, &(0x7f0000000000)) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x79010000}, 0x10}, 0x78) 11:05:38 executing program 0: socketpair(0xf, 0x3, 0x4a00, &(0x7f0000000040)) 11:05:38 executing program 4: socketpair(0xf, 0x3, 0x3201, &(0x7f0000000040)) 11:05:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x6}, 0x78) 11:05:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:38 executing program 2: socketpair(0x2, 0x6, 0xc1010000, &(0x7f0000000000)) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x7a000000}, 0x10}, 0x78) 11:05:38 executing program 0: socketpair(0xf, 0x3, 0x4a01, &(0x7f0000000040)) 11:05:38 executing program 4: socketpair(0xf, 0x3, 0x3300, &(0x7f0000000040)) 11:05:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x7}, 0x78) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x81000000}, 0x10}, 0x78) 11:05:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:38 executing program 2: socketpair(0x2, 0x6, 0xc2000000, &(0x7f0000000000)) 11:05:38 executing program 4: socketpair(0xf, 0x3, 0x3301, &(0x7f0000000040)) 11:05:38 executing program 0: socketpair(0xf, 0x3, 0x4b00, &(0x7f0000000040)) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85000000}, 0x10}, 0x78) 11:05:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x8}, 0x78) 11:05:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:38 executing program 2: socketpair(0x2, 0x6, 0xc2010000, &(0x7f0000000000)) 11:05:38 executing program 4: socketpair(0xf, 0x3, 0x3400, &(0x7f0000000040)) 11:05:38 executing program 0: socketpair(0xf, 0x3, 0x4b01, &(0x7f0000000040)) 11:05:38 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85100000}, 0x10}, 0x78) 11:05:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x9}, 0x78) 11:05:38 executing program 2: socketpair(0x2, 0x6, 0xc3000000, &(0x7f0000000000)) 11:05:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4c00, &(0x7f0000000040)) 11:05:39 executing program 4: socketpair(0xf, 0x3, 0x3401, &(0x7f0000000040)) 11:05:39 executing program 2: socketpair(0x2, 0x6, 0xc3010000, &(0x7f0000000000)) 11:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0xa}, 0x78) 11:05:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85200000}, 0x10}, 0x78) 11:05:39 executing program 4: socketpair(0xf, 0x3, 0x3500, &(0x7f0000000040)) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4c01, &(0x7f0000000040)) 11:05:39 executing program 2: socketpair(0x2, 0x6, 0xc4000000, &(0x7f0000000000)) 11:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0xb}, 0x78) 11:05:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:39 executing program 4: socketpair(0xf, 0x3, 0x3501, &(0x7f0000000040)) 11:05:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x85ffffff}, 0x10}, 0x78) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4d00, &(0x7f0000000040)) 11:05:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x90030000}, 0x10}, 0x78) 11:05:39 executing program 2: socketpair(0x2, 0x6, 0xc4010000, &(0x7f0000000000)) 11:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0xc}, 0x78) 11:05:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:39 executing program 4: socketpair(0xf, 0x3, 0x3600, &(0x7f0000000040)) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4d01, &(0x7f0000000040)) 11:05:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0x95020000}, 0x10}, 0x78) 11:05:39 executing program 2: socketpair(0x2, 0x6, 0xc5000000, &(0x7f0000000000)) 11:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0xd}, 0x78) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4e00, &(0x7f0000000040)) 11:05:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x14, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:39 executing program 4: socketpair(0xf, 0x3, 0x3601, &(0x7f0000000040)) 11:05:39 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0xe}, 0x78) 11:05:39 executing program 0: socketpair(0xf, 0x3, 0x4e01, &(0x7f0000000040)) 11:05:39 executing program 2: socketpair(0x2, 0x6, 0xc5010000, &(0x7f0000000000)) 11:05:39 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb5010000}, 0x10}, 0x78) 11:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x16, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:40 executing program 4: socketpair(0xf, 0x3, 0x3700, &(0x7f0000000040)) 11:05:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x11}, 0x78) 11:05:40 executing program 2: socketpair(0x2, 0x6, 0xc6000000, &(0x7f0000000000)) 11:05:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xb9030000}, 0x10}, 0x78) 11:05:40 executing program 0: socketpair(0xf, 0x3, 0x4f00, &(0x7f0000000040)) 11:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:40 executing program 4: socketpair(0xf, 0x3, 0x3701, &(0x7f0000000040)) 11:05:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x12}, 0x78) 11:05:40 executing program 2: socketpair(0x2, 0x6, 0xc6010000, &(0x7f0000000000)) 11:05:40 executing program 0: socketpair(0xf, 0x3, 0x4f01, &(0x7f0000000040)) 11:05:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xcd030000}, 0x10}, 0x78) 11:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:40 executing program 4: socketpair(0xf, 0x3, 0x3800, &(0x7f0000000040)) 11:05:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x2f}, 0x78) 11:05:40 executing program 2: socketpair(0x2, 0x6, 0xc7000000, &(0x7f0000000000)) 11:05:40 executing program 0: socketpair(0xf, 0x3, 0x5000, &(0x7f0000000040)) 11:05:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xec000000}, 0x10}, 0x78) 11:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:40 executing program 4: socketpair(0xf, 0x3, 0x3801, &(0x7f0000000040)) 11:05:40 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5}, 0x20000290}, 0x78) 11:05:40 executing program 2: socketpair(0x2, 0x6, 0xc7010000, &(0x7f0000000000)) 11:05:40 executing program 0: socketpair(0xf, 0x3, 0x5001, &(0x7f0000000040)) 11:05:40 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xf9030000}, 0x10}, 0x78) 11:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) [ 2505.159426][T24885] ------------[ cut here ]------------ [ 2505.179093][T24885] WARNING: CPU: 0 PID: 24885 at mm/util.c:597 kvmalloc_node+0x111/0x120 [ 2505.199217][T24885] Modules linked in: [ 2505.203406][T24885] CPU: 0 PID: 24885 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 11:05:40 executing program 2: socketpair(0x2, 0x6, 0xc8000000, &(0x7f0000000000)) 11:05:40 executing program 4: socketpair(0xf, 0x3, 0x3900, &(0x7f0000000040)) [ 2505.231559][T24885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2505.250376][T24885] RIP: 0010:kvmalloc_node+0x111/0x120 [ 2505.266775][T24885] Code: 01 00 00 00 4c 89 e7 e8 5d 12 0d 00 49 89 c5 e9 69 ff ff ff e8 50 9d d0 ff 41 89 ed 41 81 cd 00 20 01 00 eb 95 e8 3f 9d d0 ff <0f> 0b e9 4c ff ff ff 0f 1f 84 00 00 00 00 00 55 48 89 fd 53 e8 26 11:05:41 executing program 0: socketpair(0xf, 0x3, 0x5100, &(0x7f0000000040)) 11:05:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001440)=""/255, 0x2e, 0xff, 0x1}, 0x20) 11:05:41 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000001400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000001440)=""/255, 0x29, 0xff, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x4, 0x82, &(0x7f0000000180)=""/130, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x0, 0x0, 0xfd000000}, 0x10}, 0x78) [ 2505.340662][T24885] RSP: 0018:ffffc9000a097720 EFLAGS: 00010212 [ 2505.364978][T24885] RAX: 0000000000000ba5 RBX: ffffc9000a097e18 RCX: ffffc9000c032000 11:05:41 executing program 2: socketpair(0x2, 0x6, 0xc8010000, &(0x7f0000000000)) [ 2505.406703][T24885] RDX: 0000000000040000 RSI: ffffffff81a58401 RDI: 0000000000000003 [ 2505.442701][T24885] RBP: 0000000000002dc0 R08: 000000007fffffff R09: ffff8880b9c3298b 11:05:41 executing program 4: socketpair(0xf, 0x3, 0x3901, &(0x7f0000000040)) [ 2505.476423][T24885] R10: ffffffff81a583be R11: 0000000000000000 R12: 0000000200002900 [ 2505.501648][T24885] R13: 0000000000000000 R14: 00000000ffffffff R15: ffff88804a128000 [ 2505.540948][T24885] FS: 00007fc3300ef700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 2505.581867][T24885] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2505.629171][T24885] CR2: 0000000020000040 CR3: 000000004f7eb000 CR4: 00000000001506f0 [ 2505.660536][T24885] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2505.669319][T24885] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2505.680502][T24885] Call Trace: [ 2505.683816][T24885] check_btf_line+0x1a9/0xad0 [ 2505.689694][T24885] ? __fget_files+0x150/0x3e0 [ 2505.694535][T24885] ? check_subprogs+0x5f0/0x5f0 [ 2505.700027][T24885] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2505.706826][T24885] ? fput+0x2a/0x50 [ 2505.710756][T24885] bpf_check+0x1636/0xbd20 [ 2505.715254][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2505.721914][T24885] ? bpf_get_btf_vmlinux+0x10/0x10 [ 2505.728167][T24885] ? lock_downgrade+0x6e0/0x6e0 [ 2505.734001][T24885] ? __might_fault+0xd3/0x180 [ 2505.738918][T24885] ? ktime_get_with_offset+0x3f2/0x500 [ 2505.744406][T24885] ? memset+0x20/0x40 [ 2505.748607][T24885] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2505.754866][T24885] ? bpf_obj_name_cpy+0x144/0x1a0 [ 2505.760575][T24885] ? bpf_prog_load+0xe16/0x21f0 [ 2505.765521][T24885] bpf_prog_load+0xe57/0x21f0 [ 2505.770429][T24885] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 2505.776863][T24885] ? find_held_lock+0x2d/0x110 [ 2505.781644][T24885] ? __might_fault+0xd3/0x180 [ 2505.786447][T24885] ? lock_downgrade+0x6e0/0x6e0 [ 2505.791327][T24885] ? security_bpf+0x83/0xb0 [ 2505.795844][T24885] __sys_bpf+0x67e/0x5df0 [ 2505.800383][T24885] ? bpf_link_get_from_fd+0x110/0x110 [ 2505.805774][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2505.811820][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2505.817926][T24885] ? find_held_lock+0x2d/0x110 [ 2505.822714][T24885] ? trace_hardirqs_on+0x38/0x1c0 [ 2505.828551][T24885] __x64_sys_bpf+0x75/0xb0 [ 2505.832995][T24885] ? syscall_enter_from_user_mode+0x21/0x70 [ 2505.841104][T24885] do_syscall_64+0x35/0xb0 [ 2505.845553][T24885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2505.851554][T24885] RIP: 0033:0x4665f9 [ 2505.855457][T24885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2505.876034][T24885] RSP: 002b:00007fc3300ef188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2505.884593][T24885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2505.893179][T24885] RDX: 0000000000000078 RSI: 0000000020000500 RDI: 0000000000000005 [ 2505.901535][T24885] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 2505.909969][T24885] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 2505.918317][T24885] R13: 00007ffdf136de4f R14: 00007fc3300ef300 R15: 0000000000022000 [ 2505.926822][T24885] Kernel panic - not syncing: panic_on_warn set ... [ 2505.933414][T24885] CPU: 1 PID: 24885 Comm: syz-executor.1 Not tainted 5.14.0-syzkaller #0 [ 2505.941835][T24885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2505.951873][T24885] Call Trace: [ 2505.955135][T24885] dump_stack_lvl+0xcd/0x134 [ 2505.959721][T24885] panic+0x2b0/0x6dd [ 2505.963653][T24885] ? __warn_printk+0xf3/0xf3 [ 2505.968250][T24885] ? __warn.cold+0x1a/0x44 [ 2505.972684][T24885] ? kvmalloc_node+0x111/0x120 [ 2505.977465][T24885] __warn.cold+0x35/0x44 [ 2505.981715][T24885] ? kvmalloc_node+0x111/0x120 [ 2505.986474][T24885] report_bug+0x1bd/0x210 [ 2505.990814][T24885] handle_bug+0x3c/0x60 [ 2505.994963][T24885] exc_invalid_op+0x14/0x40 [ 2505.999457][T24885] asm_exc_invalid_op+0x12/0x20 [ 2506.004313][T24885] RIP: 0010:kvmalloc_node+0x111/0x120 [ 2506.009689][T24885] Code: 01 00 00 00 4c 89 e7 e8 5d 12 0d 00 49 89 c5 e9 69 ff ff ff e8 50 9d d0 ff 41 89 ed 41 81 cd 00 20 01 00 eb 95 e8 3f 9d d0 ff <0f> 0b e9 4c ff ff ff 0f 1f 84 00 00 00 00 00 55 48 89 fd 53 e8 26 [ 2506.029305][T24885] RSP: 0018:ffffc9000a097720 EFLAGS: 00010212 [ 2506.035372][T24885] RAX: 0000000000000ba5 RBX: ffffc9000a097e18 RCX: ffffc9000c032000 [ 2506.043338][T24885] RDX: 0000000000040000 RSI: ffffffff81a58401 RDI: 0000000000000003 [ 2506.051305][T24885] RBP: 0000000000002dc0 R08: 000000007fffffff R09: ffff8880b9c3298b [ 2506.059271][T24885] R10: ffffffff81a583be R11: 0000000000000000 R12: 0000000200002900 [ 2506.067238][T24885] R13: 0000000000000000 R14: 00000000ffffffff R15: ffff88804a128000 [ 2506.075208][T24885] ? kvmalloc_node+0xce/0x120 [ 2506.079908][T24885] ? kvmalloc_node+0x111/0x120 [ 2506.084678][T24885] check_btf_line+0x1a9/0xad0 [ 2506.089363][T24885] ? __fget_files+0x150/0x3e0 [ 2506.094039][T24885] ? check_subprogs+0x5f0/0x5f0 [ 2506.098904][T24885] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2506.105141][T24885] ? fput+0x2a/0x50 [ 2506.108948][T24885] bpf_check+0x1636/0xbd20 [ 2506.113366][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2506.119356][T24885] ? bpf_get_btf_vmlinux+0x10/0x10 [ 2506.124467][T24885] ? lock_downgrade+0x6e0/0x6e0 [ 2506.129317][T24885] ? __might_fault+0xd3/0x180 [ 2506.134003][T24885] ? ktime_get_with_offset+0x3f2/0x500 [ 2506.139462][T24885] ? memset+0x20/0x40 [ 2506.143441][T24885] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2506.149679][T24885] ? bpf_obj_name_cpy+0x144/0x1a0 [ 2506.154705][T24885] ? bpf_prog_load+0xe16/0x21f0 [ 2506.159557][T24885] bpf_prog_load+0xe57/0x21f0 [ 2506.164240][T24885] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 2506.170132][T24885] ? find_held_lock+0x2d/0x110 [ 2506.174895][T24885] ? __might_fault+0xd3/0x180 [ 2506.179570][T24885] ? lock_downgrade+0x6e0/0x6e0 [ 2506.184429][T24885] ? security_bpf+0x83/0xb0 [ 2506.188937][T24885] __sys_bpf+0x67e/0x5df0 [ 2506.193338][T24885] ? bpf_link_get_from_fd+0x110/0x110 [ 2506.198743][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2506.204743][T24885] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2506.210735][T24885] ? find_held_lock+0x2d/0x110 [ 2506.215523][T24885] ? trace_hardirqs_on+0x38/0x1c0 [ 2506.220559][T24885] __x64_sys_bpf+0x75/0xb0 [ 2506.224981][T24885] ? syscall_enter_from_user_mode+0x21/0x70 [ 2506.230881][T24885] do_syscall_64+0x35/0xb0 [ 2506.235303][T24885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2506.241214][T24885] RIP: 0033:0x4665f9 [ 2506.245107][T24885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.264717][T24885] RSP: 002b:00007fc3300ef188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2506.273130][T24885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 2506.281104][T24885] RDX: 0000000000000078 RSI: 0000000020000500 RDI: 0000000000000005 [ 2506.289071][T24885] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 2506.297039][T24885] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 2506.305006][T24885] R13: 00007ffdf136de4f R14: 00007fc3300ef300 R15: 0000000000022000 [ 2506.313379][T24885] Kernel Offset: disabled [ 2506.317812][T24885] Rebooting in 86400 seconds..