func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, r1]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x0, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x0, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, r1]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, r1]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: r0 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0}, 0x80) 04:35:26 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x6, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:26 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)}, 0x80) 04:35:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, r1]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4}, 0x10}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x0, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0x0, 0x7}, @call, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x0, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x0, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:27 executing program 4: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}, @generic={0x2d}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:27 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:27 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5}], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x0, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x0, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x0, 0x0, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r1, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x48) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x48) 04:35:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x48) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x0, 0x83}, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x4, &(0x7f0000000900)=@raw=[@generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0), 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0), 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0), 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x0, 0x83}, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x5, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call, @map_fd], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:29 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:29 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:29 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:29 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000640)) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x3, &(0x7f0000000900)=@raw=[@kfunc, @generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000640)) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x0, 0x83}, @call, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000640)) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:30 executing program 0: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, r0]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 4: memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x0, 0x0, 0x0, 0x0, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r3 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r3, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r2, 0xffffffffffffffff, 0xc}, 0x10) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f00000004c0)=0x6, 0x4) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0x0) 04:35:31 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@kfunc, @generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x5, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x4, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:31 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x2, &(0x7f0000000900)=@raw=[@generic, @call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x3, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r0, 0xffffffffffffffff, r1]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, 0x0, &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, r2]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x0, &(0x7f0000000900), &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r6, r0, r7]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) syz_open_dev$loop(&(0x7f0000000000), 0x2, 0x80000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) socket$unix(0x1, 0x5, 0x0) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@generic], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x1, &(0x7f0000000900)=@raw=[@call], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, r7]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, r7]}, 0x80) 04:35:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, r0, r7]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x0, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x0, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x0, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x0, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:32 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) 04:35:32 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:32 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:32 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:32 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 4: memfd_secret(0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x6, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, 0xffffffffffffffff, r0, r1, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/219, 0x4}, 0x20) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, r1, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: memfd_secret(0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 2: memfd_secret(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 3: r0 = memfd_secret(0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: bind$unix(0xffffffffffffffff, 0x0, 0x0) 04:35:33 executing program 1: memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:33 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x7, &(0x7f0000000900)=@raw=[@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 1: memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:33 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 1: memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 3: memfd_secret(0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff}, 0xc) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:33 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:33 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:33 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:33 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], 0x0, 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x0, &(0x7f0000000200), &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], 0x0, 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 4: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:34 executing program 4: r0 = memfd_secret(0x0) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 4: accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:34 executing program 4: accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) [ 112.348233][ T5460] ================================================================== [ 112.356362][ T5460] BUG: KCSAN: data-race in generic_fillattr / shmem_unlink [ 112.363570][ T5460] [ 112.365890][ T5460] write to 0xffff8881047fbd08 of 8 bytes by task 5463 on cpu 0: [ 112.373517][ T5460] shmem_unlink+0x117/0x1a0 [ 112.378032][ T5460] shmem_rename2+0x199/0x2d0 [ 112.382631][ T5460] vfs_rename+0x91b/0xd20 [ 112.386969][ T5460] do_renameat2+0x6d7/0xa20 [ 112.391493][ T5460] __x64_sys_rename+0x58/0x60 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 4: accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:34 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) [ 112.396264][ T5460] do_syscall_64+0x44/0xd0 [ 112.400774][ T5460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.406673][ T5460] [ 112.408993][ T5460] read to 0xffff8881047fbd08 of 8 bytes by task 5460 on cpu 1: [ 112.416530][ T5460] generic_fillattr+0x203/0x2b0 [ 112.421391][ T5460] vfs_statx+0x265/0x3c0 [ 112.425636][ T5460] __se_sys_newfstatat+0x63/0x260 [ 112.430674][ T5460] __x64_sys_newfstatat+0x51/0x60 [ 112.435709][ T5460] do_syscall_64+0x44/0xd0 [ 112.440130][ T5460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 112.446035][ T5460] 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 4: memfd_secret(0x0) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 112.448349][ T5460] value changed: 0x000000000000161c -> 0x0000000000001608 [ 112.455451][ T5460] [ 112.457768][ T5460] Reported by Kernel Concurrency Sanitizer on: [ 112.463908][ T5460] CPU: 1 PID: 5460 Comm: udevd Not tainted 5.17.0-rc7-syzkaller-00235-gaad611a868d1-dirty #0 [ 112.474057][ T5460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.484115][ T5460] ================================================================== 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:34 executing program 0: memfd_secret(0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 4: memfd_secret(0x0) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:34 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:34 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:34 executing program 4: memfd_secret(0x0) accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980), 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:34 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:34 executing program 1: r0 = memfd_secret(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 04:35:35 executing program 0: bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 04:35:35 executing program 3: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:35 executing program 4: r0 = memfd_secret(0x0) accept$unix(r0, 0x0, &(0x7f0000000640)) 04:35:35 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) memfd_secret(0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980), 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 1: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:35 executing program 4: r0 = memfd_secret(0x0) accept$unix(r0, 0x0, 0x0) 04:35:35 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: r0 = memfd_secret(0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, r0, 0xc}, 0x10) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980), 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:35 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:35 executing program 2: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0x58, &(0x7f0000000b80)}, 0x10) 04:35:35 executing program 2: r0 = memfd_secret(0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x6}, @generic={0x2d, 0x0, 0xf, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000980)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[r7, r0, r8]}, 0x80) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 2: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0x0, 0x1f, 0xc}, 0xc) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x888, 0x8}, 0xc) 04:35:35 executing program 3: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500), 0x10) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 2: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)=0x76) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: memfd_secret(0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', r2}, 0x10) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)=0x76) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: memfd_secret(0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r0, &(0x7f0000000700)="a3967518c13a4d43dcdbe96dcfaa1e022b87004532815db7c60365e8bb4794b159ba765d9040279ae6025412efb296c8abddcd312b0212284c9d5349c77f7f79eb622f45be688c3d28d65e4dacb1627b268b5e0e0089d4e1600aedebc7b3a904e26e37522b3bcd8a5f2d79884511caf9309e7587cc37d6fee208fd5d8b0b1740877ec72d590768f4", &(0x7f00000007c0)=""/17, 0x4}, 0x20) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)=0x76) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) r6 = accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) bind$unix(r6, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) 04:35:35 executing program 2: memfd_secret(0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) 04:35:35 executing program 2: r0 = memfd_secret(0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: r0 = memfd_secret(0x0) setsockopt$llc_int(r0, 0x10c, 0x0, 0x0, 0x0) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x1}, 0x10) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={r5, r0, 0xc}, 0x10) 04:35:35 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x4, 0x0, 0x663}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 1: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, 0xffffffffffffffff, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={0x0, 0x1}, 0x10) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000005c0)=@abs, 0x0) bind$unix(r2, &(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={0xffffffffffffffff, 0x0, &(0x7f00000007c0)=""/17, 0x4}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x20}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0x8, &(0x7f0000000900)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa}, @generic={0x2d, 0x0, 0x0, 0x7, 0x83}, @call={0x85, 0x0, 0x0, 0x96}, @map_fd, @func], &(0x7f0000000940)='GPL\x00', 0x8001, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000009c0)={0x0, 0x4, 0x663, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 04:35:35 executing program 0: r0 = memfd_secret(0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x800}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000080)="81e42d511744612c982e1b79bd7e377693e1de344afaede3e34d2a7e50d39ae4c7", &(0x7f00000000c0)=""/219, 0x4}, 0x20) r2 = memfd_secret(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xc, 0x0, 0x1f, 0xc78e, 0x301, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x3}, 0x48) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0x1, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x0, 0xd, 0x1, 0x8, 0xfffffffffffffff0, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x7, 0x6, &(0x7f0000000280)=""/6, 0x0, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000002c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xd, 0x35, 0xbe}, 0x10, 0x1c90f, r0, 0x0, &(0x7f0000000400)=[r2, r3, r0, r1, r0, r4]}, 0x80) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000004c0)=0x6, 0x4) 04:35:35 executing program 3: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) 04:35:35 executing program 4: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) pkey_free(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) 04:35:35 executing program 2: select(0x40, &(0x7f0000000000)={0x1, 0x7, 0x824, 0x3, 0x7fffffffffffffff, 0xe1, 0x6, 0x5}, &(0x7f0000000040)={0x7fffffffffffffff, 0x8870, 0x1ff, 0x8, 0x8001, 0x7, 0x0, 0xec1}, &(0x7f0000000080)={0x64, 0x8, 0x4d2f, 0x8, 0x10000, 0x1ff, 0x400, 0x39}, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x480902, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1780) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000001c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7f) r2 = memfd_secret(0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) r3 = openat$incfs(r2, &(0x7f0000000240)='.log\x00', 0x8400, 0x8d) ioctl$RTC_PIE_ON(r3, 0x7005) pselect6(0x40, &(0x7f0000000280)={0x2, 0x2e7, 0x7, 0x9, 0x30, 0x5, 0x9, 0x1}, &(0x7f00000002c0)={0x8, 0x7, 0x3, 0x7e57919e, 0x0, 0x0, 0x400, 0x9}, &(0x7f0000000300)={0xc8, 0x7fffffffffffffff, 0x2, 0x0, 0x3, 0x1a, 0xfffffffffffffffe, 0x3}, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380)={[0x76]}, 0x8}) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000400)) pkey_free(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x8, 0x80000001, 0xfffffeff, 0x20, 0x1, 0x401, '\x00', 0x0, r2, 0x3, 0x1, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={r4, &(0x7f00000004c0)="f2dca6771c0eee366a162f4fc5a6896791c93348368ff10e5c12fdf01b0256874444e50ff8c96b031e55f86dea5551d49ac302c25e875144eda36ac814d107aa4ae81372ce1641c98c9172850408e6a765f96be3ce6a398ca42d22ad8e60908430cc7d23bbee79ae0b9b5fc22b7ba2c36ba78cc900b10c3a1738c6920bda8184e9a5f706204fc511cb5e0be3031df2fb6c71f2ce9348757c87c262df3aa790b2335b05f70cd70d1e429a639b0c421882060fbb052b59e1bde2de8fb459d6a46fc778dd2f1aa8d261086f074ad351ac4c769f380e72438c23845588db8aa4537f075bb3"}, 0x20) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)=0x76) 04:35:35 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0