b, 'pids'}, {0x2d, 'rdma'}]}, 0x2b) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x100}, [@call, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r2, 0x10, r3, 0x8, &(0x7f0000000080)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r4, r5}, 0x78) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)=r2) socket$kcm(0x10, 0x2, 0x10) [ 524.045360][ T2739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x123, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc1, &(0x7f000000cf3d)=""/193, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 524.089515][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000004ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3000000) 14:19:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x24, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x4009}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r3, 0x5) ioctl$TUNSETLINK(r3, 0x400454cd, 0x7) close(r0) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 524.292083][ T2753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = gettid() r4 = socket$kcm(0x29, 0x2, 0x0) gettid() recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30) [ 524.368797][ T2763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 524.393358][ T2766] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000005ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 524.498079][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x25, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000000) [ 524.668806][ T2780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 524.682979][ T2779] device lo entered promiscuous mode [ 524.864442][ T2787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 524.888833][ T2792] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000006ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:35 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x26, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 524.911544][ T2776] Y4`Ҙ: renamed from lo 14:19:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x5000000) 14:19:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x400, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x80, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0x2) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000009500000000000029ae80799be62c93f7b091c97554bb677c101e42008000000000075900001943449fc1dcf86e0008d70000000000b1b5af0274000058547d08d3f4215a73e8f7d9ffcd53ac4807eafef8a0e0a78ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f13c7782400000000000600000000000000000000000300000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r4, 0xc0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x7ff, 0x0, 0x0, 0x0, &(0x7f0000000700)={0xa, 0x5}, 0x0, 0x0, &(0x7f0000000740)={0x5, 0x10, 0x46ca, 0x8}, &(0x7f00000009c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)=0x4}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"/666], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r7, r6, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r7, r6, 0x8000000000d}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r7, 0x0, r8, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r8, 0x5) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000b40)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x73712f1974d3c203, 0x53, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0xfb, &(0x7f00000003c0)=""/251, 0x40f00, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x4}, 0x10, r5}, 0x78) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r10, r9, 0x8000000000d}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) r12 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r12, &(0x7f0000000340)=0x1ff, 0x12) ioctl$TUNGETSNDBUF(r11, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x16, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r10, 0x0, r11, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r11, 0x5) ioctl$TUNSETLINK(r11, 0x400454cd, 0x324) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r13, 0xab) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x1, @remote}, 0x80, 0x0}, 0x20000000) [ 525.196849][ T2804] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.216446][ T2810] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.239491][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x27, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 525.322634][ T2816] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = gettid() r4 = socket$kcm(0x29, 0x2, 0x0) gettid() recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30) 14:19:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000007ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6000000) 14:19:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 525.577875][ T2839] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000008ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:36 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x28, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 525.619883][ T2844] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.641687][ T2849] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.661054][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7000000) 14:19:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 525.882898][ T2860] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.934653][ T2868] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 525.959675][ T2866] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000009ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 525.988282][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.134848][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.153586][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x53, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, &(0x7f0000000040)) 14:19:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 526.274469][ T2889] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.303412][ T2892] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = gettid() r4 = socket$kcm(0x29, 0x2, 0x0) gettid() recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30) 14:19:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x29, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000000) 14:19:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 526.511897][ T2906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.544842][ T2908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 526.575265][ T2910] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2a, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000cffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 526.650647][ T2908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc000000) [ 526.905554][ T2929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.938437][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 526.966774][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 527.041173][ T2937] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:38 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3be, [@union={0x9, 0x0, 0x0, 0x5, 0x0, 0x3f, [{0x10, 0x1, 0x2}]}]}}, &(0x7f0000000040)=""/258, 0x2a, 0x102, 0x8}, 0xfffffffffffffef3) 14:19:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2b, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = gettid() r4 = socket$kcm(0x29, 0x2, 0x0) gettid() recvmsg$kcm(r4, &(0x7f0000001c40)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000580)=""/255, 0xff}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/220, 0xdc}, {0x0}], 0x5}, 0x2000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x18000000000002e0, 0x66, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60102f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36e", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r0, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30) 14:19:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000dffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xe000000) 14:19:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:38 executing program 2: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$kcm(0xa, 0x0, 0x3a) close(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 14:19:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2c, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 527.510099][ T2961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 527.551149][ T2959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 527.621961][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 527.677326][ T2974] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000effffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:38 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2d, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf000000) 14:19:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b8004099100000000500150002008178a8001600140006c00200100003ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3089ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xc7}], 0x1}, 0x0) [ 527.971687][ T2995] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.007154][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.027123][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.141672][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00') 14:19:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2e, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000200)='em1+^^\x00', r3}, 0x30) r5 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3, 0x52, 0xff, 0xc0, 0x0, 0x6, 0x8000, 0x406685fdb688d51c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x100000001, 0x6}, 0x100, 0x7, 0x200, 0x6, 0xfffffffffffffffd, 0x5, 0x5ece}, 0x0, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xef, 0x7f, 0x80, 0x5, 0x0, 0x7, 0x8, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x4, 0xffffffffffffff8e}, 0x980, 0x0, 0x8, 0x0, 0x4, 0x100, 0xfffe}, r4, 0xe, r5, 0x3) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90000, 0x5f0c}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 14:19:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x10000000) [ 528.353860][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.376178][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.421146][ T3029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 528.482339][ T3033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:39 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x2f, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000010ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x20000000) [ 528.732617][ T3046] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x9c8ccc963ecd429f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x3061, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)=0x1) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg$kcm(r3, &(0x7f0000000700)={&(0x7f0000000300)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000540)=""/136, 0x88}, {&(0x7f0000000600)=""/211, 0xd3}, {&(0x7f00000000c0)=""/19, 0x13}], 0x3, &(0x7f0000000840)=""/4096, 0x1000}, 0x10000) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="006d9c6d6f727920ce8fb916dddc1b68b1c049e73e175509e0e24ea276f026568a534ccafe24753a1c04f190eb21cc4b220a07200686e1363ad21ecb6f066f03937125f62565e1d714699787add764d415b2b8de7ca8c68714ed5f6f2325a96533e80ebb75c7f23c76e631ec260b4b398c0c1c297b5c74279c5bcc62f4becf2f8f1ea10df759f9ba0d35a8dd45c3c12cf80e438e4d07c55853b3b051048d421c5dfa55cb120aea41760cbe774a00"/196], 0xfdef) [ 528.785151][ T3050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.823221][ T3051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 528.912871][ T3055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00') 14:19:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0x0, r2, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r2, 0x5) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x4, 0x9, 0x420, 0xffffffffffffffff, 0x7fffffff, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x9, &(0x7f00000001c0)=@raw=[@alu={0x7, 0x1, 0x7, 0x2, 0xf305a49a0f029a1d, 0x30, 0x8}, @map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3f}, @exit, @exit, @jmp={0x5, 0x0, 0xa, 0xef20639d8c13297c, 0x5, 0xffffffffffffffc0}, @map={0x18, 0x5, 0x1, 0x0, r3}, @generic={0x1, 0x7, 0x3, 0x5, 0x8}], &(0x7f00000000c0)='GPL\x00', 0x3, 0xffa, &(0x7f000062b000)=""/4090, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={0x0, r4, 0x1b}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r4, 0x0, 0xe, 0xfffffffffffffefc, &(0x7f0000000140)="917b38622c82cd626df641c1d95f", 0x0, 0xffff, 0x0, 0xfffffe9d, 0x47, &(0x7f0000000180)="77001000008c1831a410b3f93b680c332e84fbe6011a176ac612a8da5098214620e9ea8eb6a0a74a20", &(0x7f00000001c0)}, 0x28) 14:19:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000011ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x30, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3f000000) 14:19:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 529.300662][ T3072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 529.335165][ T3077] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 529.358898][ T3075] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000012ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x32, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:40 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x73) r2 = getpid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) close(r4) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) r8 = perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x69, 0x0, 0x5, 0x8, 0x0, 0xff, 0x50080, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x10001, 0x6}, 0x200, 0x0, 0x7, 0x0, 0xc9b, 0x101, 0x1}, r3, 0xc, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x780bb452d3175b32, 0x70, 0x40, 0xa1, 0x1f, 0x3f, 0x0, 0x7fff, 0x24, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xb4, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x7, 0x363, 0x6, 0xff, 0x5, 0x6}, r2, 0xe, r8, 0x0) sendmsg(r1, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0, 0x102, &(0x7f0000000000), 0x18}, 0x14f9a99854be918d) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r9, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) [ 529.451021][ T3086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 529.518114][ T3088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x40000000) [ 529.606132][ T3096] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 529.736862][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 529.825185][ T3109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00') 14:19:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000013ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x38, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x48000000) 14:19:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:41 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'batadv0\x00\xff\x01\xa0\xff\xff\xff\xff\x00', @random="0100040c0b10"}) [ 530.166521][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 530.198794][ T3132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000014ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:41 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000002a80)=ANY=[@ANYRESDEC=r1], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401}, 0x10}, 0x78) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r5, r4, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r5, r4, 0x8000000000d}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000080)) openat$cgroup_ro(r6, &(0x7f0000000740)='cpu.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r5, 0x0, r6, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={r5, 0x1, 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r7, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r7, 0x5) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r9, r8, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r9, r8, 0x8000000000d}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r10, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r9, 0x0, r10, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r10, 0x5) ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0) mkdirat$cgroup(r7, &(0x7f0000000380)='syz1\x00', 0x1ff) write$cgroup_int(r0, 0x0, 0xfffffdef) r11 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd454fd08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00000000000000000000000000008e045d29a2f6ebfb7fefcf7dc845b183fac57dc875c1b22889ce3bdfd8204ac3428252a4766b754b5fa14117a7c46b36537adea46b"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r12, 0x0, 0xd1, 0xb2, &(0x7f0000000180)="9dd86d34d31203279a838187e3e392eeabf183fb625366f70a5deeea3ba8d0d674cb9d404ad8e043e68d5fd9198aae2b7ab594395e31d718320d3574901e352bde88cb763be823e998717e39632a822a1c73dfd31adb16de2729a8bd7e49334dd1d80982c21d5e5d31da574a24d004825a0636c092ed36ba023220fa36c58eeeb5e23bb5f900985f339218fe31a5142078ca7113f5a8ddc49bb5807b369abe33d3f3c608be21e29de476332c438a4afa2464cadc39578317e9badca4c53da6d74668833224544577c057831ef03bafc375", &(0x7f0000000000)=""/178, 0xfffffff8, 0x0, 0x4e, 0x41, &(0x7f0000000280)="b5e2ebd2a7c1a5f0fe5d05e9d454bed064748c2d871ac2406838895397bba7393733307cc543f5c2801a68ca80086e6a32ba5f4dfd4d2acbc51aed16e2f3a3dc9014edb016f13896cbefb183d1ed", &(0x7f0000000300)="ad2ef7489387c7743b106bce309f6783528e47699cad656c9be5083a5bbbbf905154d35c36cd41a1670a42e0091292a14b4c7ba493b58b46c2167e9118d8cd12fc"}, 0x40) [ 530.298168][ T3143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x39, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x49010000) [ 530.456086][ T3149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 530.566255][ T3162] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 530.598038][ T3161] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 530.681867][ T3163] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='{\x00') 14:19:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000015ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4c000000) 14:19:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f000000e780)={&(0x7f000000d140)=@can={0x1d, 0x0}, 0x80, &(0x7f000000e640)=[{&(0x7f000000d1c0)=""/163, 0xa3}, {&(0x7f000000d280)=""/165, 0xa5}, {&(0x7f000000d340)=""/179, 0xb3}, {&(0x7f000000d400)=""/233, 0xe9}, {&(0x7f000000d500)=""/107, 0x6b}, {&(0x7f000000d580)=""/60, 0x3c}, {&(0x7f000000d5c0)=""/88, 0x58}, {&(0x7f000000d640)=""/4096, 0x1000}], 0x8, &(0x7f000000e6c0)=""/166, 0xa6}, 0x40008000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r4, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xf, r4, 0x5) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000000e840), 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e880)={0xa, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x1, 0x0, 0x1, 0x2, 0x0, 0x40, 0x4}, @generic={0xd5, 0x6, 0x1, 0x199e, 0x40}]}, &(0x7f00000000c0)='GPL\x00', 0xffff, 0xff, &(0x7f0000000100)=""/255, 0x41000, 0xd, [], r1, 0x12, r4, 0x8, &(0x7f000000e7c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f000000e800)={0x0, 0x3, 0xffffe000, 0x3}, 0x10, 0xffffffffffffffff, r5}, 0x78) [ 531.026011][ T3179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.053264][ T3183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 531.082872][ T3185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.158329][ T3191] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:42 executing program 2: socket$kcm(0x29, 0x4, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="a9e2d5b10bc99adc6b2cc839", 0xc}], 0x1, &(0x7f0000000140)=[@timestamping={{0x14, 0x1, 0x25, 0xc0000000}}, @timestamping={{0x14, 0x1, 0x25, 0xee}}, @timestamping={{0x14, 0x1, 0x25, 0x3e9}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xffff0000}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}, @mark={{0x14, 0x1, 0x24, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0xf0}, 0x480) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000001880)={&(0x7f0000000280)=@rc={0x1f, {0x9, 0x8, 0x2, 0x3f, 0x80, 0xfe}, 0x6}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000300)="c23400382e363859217f2671dcbb95fc8116b3e1f9e1105c1f97ea03ed9b4ef3f47bd864ac7e994287b9c690076a78de4f1769ffbb4f0daa4f77355fd98267aacc1fc58037fcc167af2cab93a815256fde43f2031f2301ee21f0346c01b3cf2bcdaeeccb429e", 0x66}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="d07fad8fb76c3f63608d082ccceb9ffc393341ff6de513ef66e8127fbaca072a1e4d9680633b07cb10a6c03b23208364661148379c38043a18b1eeb7101e5cc2", 0x40}, {&(0x7f00000013c0)="115b2e0d25c203d87df74028e00b1fc313fb2f5a988c665efa40760a4587e8a985b8e3f980da2b0125047b379677e2c4c306fc7e", 0x34}], 0x4, &(0x7f0000001440)=[{0x90, 0x113, 0x0, "a0495e0ce7ab40c82018e44f1b2b80c7f6e9ee54adab11d85bd8a1e82eaffa73d899d3a790e5a6ca1bf376e9893f3005032fd10d7db9a69c3b62e86f8129ccc1ac98a1eb59483d4a719587ca144016c61b1cc1863757f388d5c94e764ccdc8505297017d96b826f7e271fbb96bfde017d914ac0d405e87bacf36b5"}, {0x50, 0x116, 0x7d, "be2e97d571efa48e8b2f48a368a93c371650afe26247529c87c8a58da8ece5d073b2a6238bec17f0c4a5212290aeb4d021d20e2776e66a482a"}, {0x98, 0x110, 0xfffffff8, "5434c86e6fb1c1f7bfc0b0877ef25bc599b88da18d7749d00ab7120a816c7d71031d3c0d7a9778e9628722ae1591b4e266e27368370dd50a8db364d3486c1abf15ca9de59dc0cdf57a9972cc88301f7b7481ee76906be788d052a06a79146083e1c50af7de3319f411ba415510c18725696ab0c53d4cc33896f396ca3d0cef2d2ccd63154f"}, {0xb0, 0x11, 0x81, "86b9a4420ec135ee11a9100e412fd500621e3896cb05a85dbc15fcf77b2499e8ccc3d6110ef2421a7ee8fe148bc900ac3853f8b16f72a1b171daf80ec6959f3099255e4f14682a6958627ea248b7447d622426c82393fe190f3d1e977b0e04be050f11b4867490680cd1cd460890c00213880737aa75fb9fc562fb052e6ab733e4ec35add3124effec8d9c277b2b8e07982573b47ddd32e38a72dd"}, {0xc0, 0x116, 0x79, "9daa423179f8c52b9d7eac6d722587f845c383300b41eff42725cbf2c282d0cdf790b2f5693c3f3e887d1ed128f84de7cb931775bf9c482c667dedf05f0e44f636bebc8da73969e92c71ad44761b88063a672dd121dbf8e496b4dfb69932ac124cddb97eb1264d78c607819a2cfc16e29a23826be6e31804af5c91112f9eac384262df18ebf10e2328fcc8d941e0ffc0d425853a76733881d60414a449115dfbf9af2469a34e60b471af"}, {0xa0, 0x114, 0x7585, "4a2a75795f251095d23534000976c770bbe627eac83381d1c6938b9d7dbd6df36333dd796ed2b52fc3fe20299c04dba7d8727764f6777bf73c23a3edd75e8ed55a34ad3b5a0a861ec85ae58fb8cf16b71f73461d366937cd5e6ecc1540a06eac96e6a97f80035e02c199b11d68909624bc95947db4ba41917e7f0fa4502ed5f7cc290a951af80205f9d51484f2309f66"}, {0xa0, 0x92a95a69b63c8807, 0x401, "a04c5d95a9ba1980a83b6b0eaf9aece0f1c2817c519f838eac45841866e99e2c9acf673d97ec81b4cd6983049d97cc6ac4dd0fa73ac52a24b067799873a19f105b79d3ee39159d7976f3569f629229a4a006e4ec53e84474b1faeb5747666700e9e66e16f2fa3ca0c5000ad15a2c84429790af83c0417e0882cdabcf2daf25a25f933491f836dd0b4d00"}], 0x428}, 0x22142266c739d2b7) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001900)={0x3, 0xfffff04e}, 0xc) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000018c0)={r1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x9, 0x0, 0x5, &(0x7f0000001e40)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f00000027c0)={&(0x7f0000001e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x1, 0x0, 0x3, {0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x80000000}}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001f00)="a2407712a82ce728a20a89", 0xb}, {&(0x7f0000001f40)="623cd9bd789959b2fb4f4f8db54d0f6152ac6b68f3e4ad7594ed6207ecae77ba9ee96b255d0119c5be86c920c312c2b04da5536b429738a616b63df9deabb133647f8075811d2267a34e3520e6fb322d3c1216b2b2a1e6805c298d70d25ac18dd8b24ee7d8d7afaa51fad3f58532eab5cfca5a88807b60438f45d9213caabd8dc2bfa2271ea6585c2b6aa0884a313e9e86", 0x91}, {&(0x7f0000002000)="e1cd60fbee87bf0f8b7300d428c366b5fca53fbebe25c4695e902713e291537afa506147d7438f9f733886bc21c589f36eb7e4f11ff98ea73e1759c883b1646b7847c090d3173418282998b64bdf1c4501541b49e7cf544266b71f6977eb1e1330c9792a116dd5f4bad00b7a5f792f1d33c94dcd02d4411ed8411e39298d9dc6877458af4ac3bd0a7bf0d5cdde609717614b61ce01c71349e9236977214537e621ef367357fc0bc1d61c69ce115bca74fa3e98877b6e6f1a90fbac7321f8dc4a1637b10d33ab2af2af717f23dd3fe87428ae4b190a7e20d918414ab8708f", 0xde}], 0x3, &(0x7f0000002800)=ANY=[@ANYBLOB="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"], 0x660}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160400180001ac0f00000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 14:19:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000016ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x60000000) 14:19:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 531.424569][ T3207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.449898][ T3211] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.496710][ T3204] __nla_validate_parse: 6 callbacks suppressed [ 531.496721][ T3204] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 531.528209][ T3215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.676550][ T3219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.703429][ T3213] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 14:19:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) close(r1) 14:19:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000017ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x65580000) 14:19:42 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 531.951061][ T3233] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 531.967662][ T3229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:42 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 532.017955][ T3240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.052022][ T3241] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000018ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x68000000) [ 532.272276][ T3255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.283385][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 532.371383][ T3261] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.511230][ T3266] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r2) 14:19:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6c000000) 14:19:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000019ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 532.767773][ T3286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.798510][ T3281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 532.861355][ T3295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000001affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:43 executing program 2: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x74000000) [ 533.179786][ T3315] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 533.244417][ T3324] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 533.297305][ T3325] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 533.321567][ T3326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) 14:19:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:44 executing program 2: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000001bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7a000000) 14:19:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x8, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 533.621408][ T3344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 533.642682][ T3343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:44 executing program 2: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 533.711253][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 533.739950][ T3356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x81000000) 14:19:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) 14:19:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000003fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:44 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x88a8ffff) [ 534.174792][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 534.199724][ T3389] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 534.246286][ T3393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:45 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431602000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x9effffff) 14:19:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xb, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) 14:19:45 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431603000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0004000) 14:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xd, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431604000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2) 14:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431605000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0008000) 14:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431606000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000a000) 14:19:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xf, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x10, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2) 14:19:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431607000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa0010000) 14:19:47 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x11, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160a000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:47 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc3ffffff) 14:19:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000140)=r2) 14:19:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:47 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:47 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x13, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffff) 14:19:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160e000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x14, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1) 14:19:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfcffffff) 14:19:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x15, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160f000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x16, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffa888) 14:19:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1) 14:19:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431610000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x17, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431648000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffff000) 14:19:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 14:19:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x18, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43164c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff7f) 14:19:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r1) 14:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 14:19:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff9e) 14:19:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431660000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 14:19:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431668000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffc3) 14:19:49 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43166c000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffff0) 14:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:50 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x44, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431674000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffffc) 14:19:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x1a0ffffffff) 14:19:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43167a000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x60, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316f0000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x64, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000a0ffffffff) 14:19:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600030040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x8000a0ffffffff) 14:19:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600050040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x84, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa000a0ffffffff) 14:19:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600060040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9c, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600070040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:52 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffffffffff) 14:19:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431656080040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:19:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x100000000000000) 14:19:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 542.374311][ T3959] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xbc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 542.472755][ T3967] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x200000000000000) 14:19:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:19:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000e0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 542.770885][ T3984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 542.871516][ T3993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:19:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x300000000000000) 14:19:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:54 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600200040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 543.246464][ T4019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xdc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 543.341425][ T4024] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x400000000000000) 14:19:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316003f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 543.634244][ T4045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:54 executing program 2: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 543.685124][ T4050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe4, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600400040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x500000000000000) 14:19:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:54 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xfc, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 544.076232][ T4079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 544.117031][ T4083] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x600000000000000) 14:19:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600480040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x180, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:55 executing program 2: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) [ 544.399152][ T4099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1a0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:55 executing program 2: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) [ 544.531142][ T4114] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316004c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x700000000000000) 14:19:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:55 executing program 2: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 14:19:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431608560040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 544.876902][ T4139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:55 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x500, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 544.990555][ T4139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xa00000000000000) 14:19:56 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431665580040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 545.353829][ T4174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:56 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600600040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 545.480976][ T4183] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x700, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:56 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc00000000000000) 14:19:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431658650040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x900, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:56 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 545.916746][ T4219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600680040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 546.047378][ T4228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xe00000000000000) 14:19:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xb00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316006c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 546.338431][ T4250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:57 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 546.451343][ T4258] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:57 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf00000000000000) 14:19:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600740040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:57 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 546.751262][ T4281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316007a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xd00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 546.881225][ T4294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:57 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x1000000000000000) 14:19:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600810040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 547.217351][ T4316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 547.301804][ T4316] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:58 executing program 2: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xf00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600f00040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x2000000000000000) 14:19:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 547.650675][ T4350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000051ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 547.781116][ T4361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 547.928215][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x3f00000000000000) [ 547.984178][ T4371] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 548.085095][ T4382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:59 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600020040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 548.184524][ T4386] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 548.306596][ T4398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:19:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4000000000000000) 14:19:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600030040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1500, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:19:59 executing program 2 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 548.653974][ T4419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:19:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:19:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 548.764952][ T4425] FAULT_INJECTION: forcing a failure. [ 548.764952][ T4425] name failslab, interval 1, probability 0, space 0, times 0 [ 548.811724][ T4432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 548.852760][ T4425] CPU: 0 PID: 4425 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 548.861798][ T4425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.872664][ T4425] Call Trace: [ 548.877106][ T4425] dump_stack+0x197/0x210 [ 548.881472][ T4425] should_fail.cold+0xa/0x15 [ 548.886483][ T4425] ? fault_create_debugfs_attr+0x180/0x180 [ 548.892670][ T4425] ? ___might_sleep+0x163/0x2c0 [ 548.898096][ T4425] __should_failslab+0x121/0x190 [ 548.903079][ T4425] should_failslab+0x9/0x14 [ 548.907605][ T4425] kmem_cache_alloc_node_trace+0x274/0x750 [ 548.913443][ T4425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.920388][ T4425] ? cap_capable+0x205/0x270 [ 548.925329][ T4425] __kmalloc_node+0x3d/0x70 [ 548.930458][ T4425] __bpf_map_area_alloc+0xbd/0xf0 [ 548.935849][ T4425] bpf_map_area_alloc+0x20/0x30 [ 548.940795][ T4425] array_map_alloc+0x4bc/0x7d0 [ 548.945661][ T4425] ? array_of_map_free+0x50/0x50 [ 548.951131][ T4425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.957380][ T4425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.963793][ T4425] ? array_of_map_free+0x50/0x50 [ 548.968806][ T4425] __do_sys_bpf+0x478/0x3610 [ 548.973814][ T4425] ? bpf_prog_load+0x1960/0x1960 [ 548.982787][ T4425] ? __kasan_check_write+0x14/0x20 [ 548.988069][ T4425] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 548.993788][ T4425] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 548.999155][ T4425] ? wait_for_completion+0x440/0x440 [ 549.004571][ T4425] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 549.010846][ T4425] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.016412][ T4425] ? do_syscall_64+0x26/0x790 [ 549.021354][ T4425] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.027961][ T4425] ? do_syscall_64+0x26/0x790 [ 549.032654][ T4425] __x64_sys_bpf+0x73/0xb0 [ 549.037072][ T4425] do_syscall_64+0xfa/0x790 [ 549.041863][ T4425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.048176][ T4425] RIP: 0033:0x45a919 [ 549.052059][ T4425] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.071653][ T4425] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 549.080355][ T4425] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 549.088834][ T4425] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:19:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600040040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:19:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1600, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 549.097072][ T4425] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 549.106616][ T4425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 549.114832][ T4425] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4800000000000000) 14:20:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1700, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600050040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:00 executing program 2 (fault-call:0 fault-nth:1): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 549.338879][ T4451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 549.416966][ T4461] FAULT_INJECTION: forcing a failure. [ 549.416966][ T4461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.447441][ T4461] CPU: 1 PID: 4461 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 549.456352][ T4461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.466421][ T4461] Call Trace: [ 549.469742][ T4461] dump_stack+0x197/0x210 [ 549.474095][ T4461] should_fail.cold+0xa/0x15 [ 549.478718][ T4461] ? fault_create_debugfs_attr+0x180/0x180 [ 549.484558][ T4461] ? ___might_sleep+0x163/0x2c0 [ 549.489436][ T4461] should_fail_alloc_page+0x50/0x60 [ 549.494670][ T4461] __alloc_pages_nodemask+0x1a1/0x910 [ 549.500213][ T4461] ? __alloc_pages_slowpath+0x2920/0x2920 [ 549.505963][ T4461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.512410][ T4461] ? find_next_bit+0x107/0x130 [ 549.517214][ T4461] pcpu_populate_chunk+0xf8/0x940 [ 549.522250][ T4461] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 549.531197][ T4461] ? find_next_bit+0xc7/0x130 [ 549.535892][ T4461] pcpu_alloc+0xd5b/0x1380 [ 549.540555][ T4461] ? pcpu_alloc_area+0x820/0x820 [ 549.546317][ T4461] __alloc_percpu_gfp+0x28/0x30 [ 549.552073][ T4461] array_map_alloc+0x698/0x7d0 [ 549.556956][ T4461] ? array_of_map_free+0x50/0x50 [ 549.562005][ T4461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.568275][ T4461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.574564][ T4461] ? array_of_map_free+0x50/0x50 [ 549.579523][ T4461] __do_sys_bpf+0x478/0x3610 [ 549.584137][ T4461] ? bpf_prog_load+0x1960/0x1960 [ 549.589333][ T4461] ? __kasan_check_write+0x14/0x20 [ 549.594660][ T4461] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 549.600285][ T4461] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 549.606134][ T4461] ? wait_for_completion+0x440/0x440 [ 549.611534][ T4461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 549.617794][ T4461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.623365][ T4461] ? do_syscall_64+0x26/0x790 [ 549.628587][ T4461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.634680][ T4461] ? do_syscall_64+0x26/0x790 [ 549.639630][ T4461] __x64_sys_bpf+0x73/0xb0 [ 549.644069][ T4461] do_syscall_64+0xfa/0x790 [ 549.648668][ T4461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.654570][ T4461] RIP: 0033:0x45a919 [ 549.658898][ T4461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.679110][ T4461] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 549.687536][ T4461] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 549.695779][ T4461] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 549.704119][ T4461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:20:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1800, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 549.712186][ T4461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 549.720435][ T4461] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600060040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:00 executing program 2 (fault-call:0 fault-nth:2): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:00 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 549.991934][ T4485] FAULT_INJECTION: forcing a failure. [ 549.991934][ T4485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 550.036446][ T4485] CPU: 1 PID: 4485 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 550.045093][ T4485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.055255][ T4485] Call Trace: [ 550.058750][ T4485] dump_stack+0x197/0x210 [ 550.063116][ T4485] should_fail.cold+0xa/0x15 [ 550.067734][ T4485] ? fault_create_debugfs_attr+0x180/0x180 [ 550.073559][ T4485] ? ___might_sleep+0x163/0x2c0 [ 550.078467][ T4485] should_fail_alloc_page+0x50/0x60 [ 550.083687][ T4485] __alloc_pages_nodemask+0x1a1/0x910 [ 550.089069][ T4485] ? __alloc_pages_slowpath+0x2920/0x2920 [ 550.094802][ T4485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.101224][ T4485] ? find_next_bit+0x107/0x130 [ 550.105985][ T4485] pcpu_populate_chunk+0xf8/0x940 [ 550.111033][ T4485] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 550.117040][ T4485] ? find_next_bit+0xc7/0x130 [ 550.121758][ T4485] pcpu_alloc+0xd5b/0x1380 [ 550.126297][ T4485] ? pcpu_alloc_area+0x820/0x820 [ 550.131288][ T4485] __alloc_percpu_gfp+0x28/0x30 [ 550.136153][ T4485] array_map_alloc+0x698/0x7d0 [ 550.140921][ T4485] ? array_of_map_free+0x50/0x50 [ 550.145852][ T4485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.152081][ T4485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.158319][ T4485] ? array_of_map_free+0x50/0x50 [ 550.163278][ T4485] __do_sys_bpf+0x478/0x3610 [ 550.167858][ T4485] ? bpf_prog_load+0x1960/0x1960 [ 550.172788][ T4485] ? __kasan_check_write+0x14/0x20 [ 550.177886][ T4485] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 550.183428][ T4485] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 550.188723][ T4485] ? wait_for_completion+0x440/0x440 [ 550.194030][ T4485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.201001][ T4485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 550.206488][ T4485] ? do_syscall_64+0x26/0x790 [ 550.211352][ T4485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.217448][ T4485] ? do_syscall_64+0x26/0x790 [ 550.222259][ T4485] __x64_sys_bpf+0x73/0xb0 [ 550.226678][ T4485] do_syscall_64+0xfa/0x790 [ 550.231262][ T4485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.237162][ T4485] RIP: 0033:0x45a919 [ 550.241663][ T4485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 550.261982][ T4485] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 550.270592][ T4485] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 550.278580][ T4485] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 550.286546][ T4485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 550.294785][ T4485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 550.302930][ T4485] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4901000000000000) 14:20:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600070040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 550.495983][ T4496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:01 executing program 2 (fault-call:0 fault-nth:3): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 550.581215][ T4508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x4c00000000000000) 14:20:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 550.706946][ T4514] FAULT_INJECTION: forcing a failure. [ 550.706946][ T4514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 550.797599][ T4514] CPU: 0 PID: 4514 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 550.806232][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.816293][ T4514] Call Trace: [ 550.819606][ T4514] dump_stack+0x197/0x210 [ 550.823951][ T4514] should_fail.cold+0xa/0x15 [ 550.828554][ T4514] ? fault_create_debugfs_attr+0x180/0x180 [ 550.834370][ T4514] ? ___might_sleep+0x163/0x2c0 [ 550.839243][ T4514] should_fail_alloc_page+0x50/0x60 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3f00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 550.844444][ T4514] __alloc_pages_nodemask+0x1a1/0x910 [ 550.849826][ T4514] ? __alloc_pages_slowpath+0x2920/0x2920 [ 550.855567][ T4514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.861813][ T4514] ? find_next_bit+0x107/0x130 [ 550.866591][ T4514] pcpu_populate_chunk+0xf8/0x940 [ 550.871619][ T4514] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 550.877347][ T4514] ? find_next_bit+0xc7/0x130 [ 550.882045][ T4514] pcpu_alloc+0xd5b/0x1380 [ 550.886487][ T4514] ? pcpu_alloc_area+0x820/0x820 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 550.886864][ T4528] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 550.891448][ T4514] __alloc_percpu_gfp+0x28/0x30 [ 550.891466][ T4514] array_map_alloc+0x698/0x7d0 [ 550.891487][ T4514] ? array_of_map_free+0x50/0x50 [ 550.891513][ T4514] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 550.919523][ T4514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 550.925776][ T4514] ? array_of_map_free+0x50/0x50 [ 550.930732][ T4514] __do_sys_bpf+0x478/0x3610 [ 550.935338][ T4514] ? bpf_prog_load+0x1960/0x1960 [ 550.940285][ T4514] ? __kasan_check_write+0x14/0x20 [ 550.945405][ T4514] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 550.950955][ T4514] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 550.956250][ T4514] ? wait_for_completion+0x440/0x440 [ 550.961553][ T4514] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 550.967826][ T4514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 550.973394][ T4514] ? do_syscall_64+0x26/0x790 [ 550.978076][ T4514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.984149][ T4514] ? do_syscall_64+0x26/0x790 [ 550.988843][ T4514] __x64_sys_bpf+0x73/0xb0 [ 550.993270][ T4514] do_syscall_64+0xfa/0x790 14:20:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 550.997779][ T4514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.003679][ T4514] RIP: 0033:0x45a919 [ 551.007587][ T4514] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.027193][ T4514] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 551.035608][ T4514] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.043583][ T4514] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 551.051578][ T4514] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 551.059550][ T4514] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 551.067524][ T4514] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 551.118768][ T4525] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:02 executing program 2 (fault-call:0 fault-nth:4): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6000000000000000) 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000e0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 551.436952][ T4565] FAULT_INJECTION: forcing a failure. [ 551.436952][ T4565] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 551.454617][ T4568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x6400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.483980][ T4565] CPU: 0 PID: 4565 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 551.492597][ T4565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.502655][ T4565] Call Trace: [ 551.505955][ T4565] dump_stack+0x197/0x210 [ 551.510308][ T4565] should_fail.cold+0xa/0x15 [ 551.514916][ T4565] ? fault_create_debugfs_attr+0x180/0x180 [ 551.520737][ T4565] ? ___might_sleep+0x163/0x2c0 [ 551.525609][ T4565] should_fail_alloc_page+0x50/0x60 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x7c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.530817][ T4565] __alloc_pages_nodemask+0x1a1/0x910 [ 551.536200][ T4565] ? __alloc_pages_slowpath+0x2920/0x2920 [ 551.541937][ T4565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 551.548182][ T4565] ? find_next_bit+0x107/0x130 [ 551.552966][ T4565] pcpu_populate_chunk+0xf8/0x940 [ 551.557996][ T4565] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 551.563726][ T4565] ? find_next_bit+0xc7/0x130 [ 551.568422][ T4565] pcpu_alloc+0xd5b/0x1380 [ 551.572859][ T4565] ? pcpu_alloc_area+0x820/0x820 [ 551.577824][ T4565] __alloc_percpu_gfp+0x28/0x30 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x8400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.582684][ T4565] array_map_alloc+0x698/0x7d0 [ 551.587455][ T4565] ? array_of_map_free+0x50/0x50 [ 551.592394][ T4565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 551.598636][ T4565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.604887][ T4565] ? array_of_map_free+0x50/0x50 [ 551.609839][ T4565] __do_sys_bpf+0x478/0x3610 [ 551.614441][ T4565] ? bpf_prog_load+0x1960/0x1960 [ 551.619385][ T4565] ? __kasan_check_write+0x14/0x20 [ 551.624502][ T4565] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x9c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.630049][ T4565] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 551.635339][ T4565] ? wait_for_completion+0x440/0x440 [ 551.640632][ T4565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 551.646895][ T4565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.652360][ T4565] ? do_syscall_64+0x26/0x790 [ 551.657044][ T4565] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.663119][ T4565] ? do_syscall_64+0x26/0x790 [ 551.667839][ T4565] __x64_sys_bpf+0x73/0xb0 [ 551.672264][ T4565] do_syscall_64+0xfa/0x790 [ 551.676882][ T4565] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316000f0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.682775][ T4565] RIP: 0033:0x45a919 [ 551.686671][ T4565] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.706272][ T4565] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 551.714683][ T4565] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 551.722656][ T4565] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 551.730629][ T4565] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 551.738607][ T4565] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 551.746579][ T4565] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:02 executing program 2 (fault-call:0 fault-nth:5): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xa400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 551.912289][ T4568] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6558000000000000) 14:20:02 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600100040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 552.066700][ T4607] FAULT_INJECTION: forcing a failure. [ 552.066700][ T4607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 552.099151][ T4607] CPU: 1 PID: 4607 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xbc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.107797][ T4607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.117860][ T4607] Call Trace: [ 552.121172][ T4607] dump_stack+0x197/0x210 [ 552.125529][ T4607] should_fail.cold+0xa/0x15 [ 552.130140][ T4607] ? fault_create_debugfs_attr+0x180/0x180 [ 552.135961][ T4607] ? ___might_sleep+0x163/0x2c0 [ 552.140842][ T4607] should_fail_alloc_page+0x50/0x60 [ 552.146056][ T4607] __alloc_pages_nodemask+0x1a1/0x910 [ 552.151441][ T4607] ? __alloc_pages_slowpath+0x2920/0x2920 [ 552.157182][ T4607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 14:20:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600480040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 552.163442][ T4607] ? find_next_bit+0x107/0x130 [ 552.168231][ T4607] pcpu_populate_chunk+0xf8/0x940 [ 552.173270][ T4607] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 552.179002][ T4607] ? find_next_bit+0xc7/0x130 [ 552.183701][ T4607] pcpu_alloc+0xd5b/0x1380 [ 552.188138][ T4607] ? pcpu_alloc_area+0x820/0x820 [ 552.193102][ T4607] __alloc_percpu_gfp+0x28/0x30 [ 552.197970][ T4607] array_map_alloc+0x698/0x7d0 [ 552.202753][ T4607] ? array_of_map_free+0x50/0x50 [ 552.207711][ T4607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.213970][ T4607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.215662][ T4622] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 552.220219][ T4607] ? array_of_map_free+0x50/0x50 [ 552.220235][ T4607] __do_sys_bpf+0x478/0x3610 [ 552.220255][ T4607] ? bpf_prog_load+0x1960/0x1960 [ 552.220271][ T4607] ? __kasan_check_write+0x14/0x20 [ 552.220284][ T4607] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 552.220300][ T4607] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 552.220314][ T4607] ? wait_for_completion+0x440/0x440 [ 552.220337][ T4607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.220368][ T4607] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.220381][ T4607] ? do_syscall_64+0x26/0x790 [ 552.220393][ T4607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.220404][ T4607] ? do_syscall_64+0x26/0x790 [ 552.220423][ T4607] __x64_sys_bpf+0x73/0xb0 [ 552.220438][ T4607] do_syscall_64+0xfa/0x790 [ 552.220457][ T4607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.220469][ T4607] RIP: 0033:0x45a919 [ 552.220483][ T4607] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.220489][ T4607] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 552.220503][ T4607] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 552.220511][ T4607] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 552.220527][ T4607] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:03 executing program 2 (fault-call:0 fault-nth:6): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.252831][ T4607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 552.252840][ T4607] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 552.427087][ T4628] FAULT_INJECTION: forcing a failure. [ 552.427087][ T4628] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 552.450468][ T4630] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 552.468074][ T4628] CPU: 0 PID: 4628 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 14:20:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xc400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.476708][ T4628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.486781][ T4628] Call Trace: [ 552.490089][ T4628] dump_stack+0x197/0x210 [ 552.494447][ T4628] should_fail.cold+0xa/0x15 [ 552.499058][ T4628] ? fault_create_debugfs_attr+0x180/0x180 [ 552.504882][ T4628] ? ___might_sleep+0x163/0x2c0 [ 552.509765][ T4628] should_fail_alloc_page+0x50/0x60 [ 552.514987][ T4628] __alloc_pages_nodemask+0x1a1/0x910 [ 552.520373][ T4628] ? __alloc_pages_slowpath+0x2920/0x2920 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xdc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.526115][ T4628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.532395][ T4628] ? find_next_bit+0x107/0x130 [ 552.537182][ T4628] pcpu_populate_chunk+0xf8/0x940 [ 552.542218][ T4628] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 552.547950][ T4628] ? find_next_bit+0xc7/0x130 [ 552.552647][ T4628] pcpu_alloc+0xd5b/0x1380 [ 552.557088][ T4628] ? pcpu_alloc_area+0x820/0x820 [ 552.562050][ T4628] __alloc_percpu_gfp+0x28/0x30 [ 552.566909][ T4628] array_map_alloc+0x698/0x7d0 [ 552.571691][ T4628] ? array_of_map_free+0x50/0x50 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.576647][ T4628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.582898][ T4628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 552.589147][ T4628] ? array_of_map_free+0x50/0x50 [ 552.594092][ T4628] __do_sys_bpf+0x478/0x3610 [ 552.598691][ T4628] ? bpf_prog_load+0x1960/0x1960 [ 552.603622][ T4628] ? __kasan_check_write+0x14/0x20 [ 552.608730][ T4628] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 552.614291][ T4628] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 552.619584][ T4628] ? wait_for_completion+0x440/0x440 [ 552.624879][ T4628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.631142][ T4628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.636610][ T4628] ? do_syscall_64+0x26/0x790 [ 552.641292][ T4628] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.647353][ T4628] ? do_syscall_64+0x26/0x790 [ 552.652036][ T4628] __x64_sys_bpf+0x73/0xb0 [ 552.656462][ T4628] do_syscall_64+0xfa/0x790 [ 552.660983][ T4628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.666874][ T4628] RIP: 0033:0x45a919 14:20:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6800000000000000) 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xe400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 552.670761][ T4628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.690476][ T4628] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 552.698902][ T4628] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 552.706879][ T4628] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 552.714854][ T4628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:20:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316004c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 552.722832][ T4628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 552.730805][ T4628] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0xfc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 552.825671][ T4655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:03 executing program 2 (fault-call:0 fault-nth:7): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 552.972620][ T4655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600600040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x6c00000000000000) 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x10400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.079175][ T4670] FAULT_INJECTION: forcing a failure. [ 553.079175][ T4670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 553.142608][ T4670] CPU: 1 PID: 4670 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 553.151235][ T4670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.151241][ T4670] Call Trace: [ 553.151267][ T4670] dump_stack+0x197/0x210 [ 553.151290][ T4670] should_fail.cold+0xa/0x15 [ 553.151309][ T4670] ? fault_create_debugfs_attr+0x180/0x180 [ 553.151327][ T4670] ? ___might_sleep+0x163/0x2c0 [ 553.151351][ T4670] should_fail_alloc_page+0x50/0x60 [ 553.189417][ T4670] __alloc_pages_nodemask+0x1a1/0x910 [ 553.194812][ T4670] ? __alloc_pages_slowpath+0x2920/0x2920 [ 553.200557][ T4670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.206796][ T4670] ? find_next_bit+0x107/0x130 [ 553.206821][ T4670] pcpu_populate_chunk+0xf8/0x940 [ 553.206840][ T4670] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 553.222356][ T4670] ? find_next_bit+0xc7/0x130 [ 553.227069][ T4670] pcpu_alloc+0xd5b/0x1380 [ 553.231515][ T4670] ? pcpu_alloc_area+0x820/0x820 [ 553.236483][ T4670] __alloc_percpu_gfp+0x28/0x30 [ 553.241337][ T4670] array_map_alloc+0x698/0x7d0 [ 553.241361][ T4670] ? array_of_map_free+0x50/0x50 [ 553.241380][ T4670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.241393][ T4670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.241408][ T4670] ? array_of_map_free+0x50/0x50 [ 553.241424][ T4670] __do_sys_bpf+0x478/0x3610 [ 553.241441][ T4670] ? bpf_prog_load+0x1960/0x1960 [ 553.241459][ T4670] ? __kasan_check_write+0x14/0x20 [ 553.257508][ T4670] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 553.257527][ T4670] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 553.257544][ T4670] ? wait_for_completion+0x440/0x440 [ 553.257566][ T4670] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.257595][ T4670] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 553.265395][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 553.268748][ T4670] ? do_syscall_64+0x26/0x790 [ 553.268765][ T4670] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.268783][ T4670] ? do_syscall_64+0x26/0x790 [ 553.333791][ T4670] __x64_sys_bpf+0x73/0xb0 [ 553.338228][ T4670] do_syscall_64+0xfa/0x790 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x11c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.342755][ T4670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.348655][ T4670] RIP: 0033:0x45a919 [ 553.352558][ T4670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.372169][ T4670] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 553.380600][ T4670] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.388582][ T4670] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 553.396561][ T4670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 553.404545][ T4670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 553.412517][ T4670] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:04 executing program 2 (fault-call:0 fault-nth:8): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.470911][ T4684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600680040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7400000000000000) 14:20:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x12400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.681729][ T4708] FAULT_INJECTION: forcing a failure. [ 553.681729][ T4708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 553.783768][ T4708] CPU: 1 PID: 4708 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 553.792406][ T4708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.802470][ T4708] Call Trace: [ 553.805778][ T4708] dump_stack+0x197/0x210 [ 553.807625][ T4721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 553.810120][ T4708] should_fail.cold+0xa/0x15 [ 553.810140][ T4708] ? fault_create_debugfs_attr+0x180/0x180 [ 553.810162][ T4708] ? ___might_sleep+0x163/0x2c0 [ 553.810191][ T4708] should_fail_alloc_page+0x50/0x60 [ 553.810205][ T4708] __alloc_pages_nodemask+0x1a1/0x910 [ 553.810224][ T4708] ? __alloc_pages_slowpath+0x2920/0x2920 [ 553.810245][ T4708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.810263][ T4708] ? find_next_bit+0x107/0x130 [ 553.860059][ T4708] pcpu_populate_chunk+0xf8/0x940 [ 553.865121][ T4708] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 553.870862][ T4708] ? find_next_bit+0xc7/0x130 [ 553.875584][ T4708] pcpu_alloc+0xd5b/0x1380 [ 553.880034][ T4708] ? pcpu_alloc_area+0x820/0x820 [ 553.885004][ T4708] __alloc_percpu_gfp+0x28/0x30 [ 553.889881][ T4708] array_map_alloc+0x698/0x7d0 [ 553.894673][ T4708] ? array_of_map_free+0x50/0x50 [ 553.899631][ T4708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 553.905875][ T4708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.912119][ T4708] ? array_of_map_free+0x50/0x50 [ 553.917081][ T4708] __do_sys_bpf+0x478/0x3610 [ 553.921686][ T4708] ? bpf_prog_load+0x1960/0x1960 [ 553.926630][ T4708] ? __kasan_check_write+0x14/0x20 [ 553.931745][ T4708] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 553.937301][ T4708] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 553.942590][ T4708] ? wait_for_completion+0x440/0x440 [ 553.947876][ T4708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 553.947910][ T4708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 553.959593][ T4708] ? do_syscall_64+0x26/0x790 [ 553.964277][ T4708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.970354][ T4708] ? do_syscall_64+0x26/0x790 [ 553.975048][ T4708] __x64_sys_bpf+0x73/0xb0 [ 553.979472][ T4708] do_syscall_64+0xfa/0x790 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x13c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316006c0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x14400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 553.983990][ T4708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.989877][ T4708] RIP: 0033:0x45a919 [ 553.989893][ T4708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.989901][ T4708] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 553.989916][ T4708] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 553.989925][ T4708] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 553.989933][ T4708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 553.989942][ T4708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 553.989950][ T4708] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:05 executing program 2 (fault-call:0 fault-nth:9): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x15c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600740040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 554.170551][ T4717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 554.247999][ T4734] FAULT_INJECTION: forcing a failure. [ 554.247999][ T4734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x7a00000000000000) [ 554.317520][ T4734] CPU: 1 PID: 4734 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 554.326265][ T4734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.326272][ T4734] Call Trace: [ 554.326299][ T4734] dump_stack+0x197/0x210 [ 554.326322][ T4734] should_fail.cold+0xa/0x15 [ 554.326341][ T4734] ? fault_create_debugfs_attr+0x180/0x180 [ 554.326358][ T4734] ? ___might_sleep+0x163/0x2c0 [ 554.326384][ T4734] should_fail_alloc_page+0x50/0x60 [ 554.326397][ T4734] __alloc_pages_nodemask+0x1a1/0x910 [ 554.326417][ T4734] ? __alloc_pages_slowpath+0x2920/0x2920 [ 554.326441][ T4734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.381804][ T4734] ? find_next_bit+0x107/0x130 [ 554.381830][ T4734] pcpu_populate_chunk+0xf8/0x940 [ 554.381845][ T4734] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 554.381856][ T4734] ? find_next_bit+0xc7/0x130 [ 554.381879][ T4734] pcpu_alloc+0xd5b/0x1380 [ 554.381904][ T4734] ? pcpu_alloc_area+0x820/0x820 [ 554.381931][ T4734] __alloc_percpu_gfp+0x28/0x30 [ 554.416213][ T4734] array_map_alloc+0x698/0x7d0 [ 554.420980][ T4734] ? array_of_map_free+0x50/0x50 [ 554.421008][ T4734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.421027][ T4734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.421041][ T4734] ? array_of_map_free+0x50/0x50 [ 554.421058][ T4734] __do_sys_bpf+0x478/0x3610 [ 554.421079][ T4734] ? bpf_prog_load+0x1960/0x1960 [ 554.421093][ T4734] ? __kasan_check_write+0x14/0x20 [ 554.421111][ T4734] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 554.455426][ T4757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 554.458111][ T4734] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 554.458130][ T4734] ? wait_for_completion+0x440/0x440 [ 554.458155][ T4734] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.458191][ T4734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 554.493229][ T4734] ? do_syscall_64+0x26/0x790 [ 554.497916][ T4734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.503987][ T4734] ? do_syscall_64+0x26/0x790 [ 554.508682][ T4734] __x64_sys_bpf+0x73/0xb0 [ 554.513110][ T4734] do_syscall_64+0xfa/0x790 [ 554.517739][ T4734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.523635][ T4734] RIP: 0033:0x45a919 [ 554.527539][ T4734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.547148][ T4734] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 554.555572][ T4734] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e4316007a0040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x16400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 554.563549][ T4734] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 554.571524][ T4734] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 554.579521][ T4734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 554.587493][ T4734] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x17c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:05 executing program 2 (fault-call:0 fault-nth:10): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600f00040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 554.841485][ T4753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:05 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 554.981708][ T4784] FAULT_INJECTION: forcing a failure. [ 554.981708][ T4784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:05 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x18400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x8100000000000000) 14:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000340ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 555.185504][ T4784] CPU: 1 PID: 4784 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 555.194131][ T4784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.204188][ T4784] Call Trace: [ 555.207486][ T4784] dump_stack+0x197/0x210 [ 555.208728][ T4801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 555.211827][ T4784] should_fail.cold+0xa/0x15 [ 555.211849][ T4784] ? fault_create_debugfs_attr+0x180/0x180 [ 555.211864][ T4784] ? ___might_sleep+0x163/0x2c0 [ 555.211893][ T4784] should_fail_alloc_page+0x50/0x60 [ 555.211905][ T4784] __alloc_pages_nodemask+0x1a1/0x910 [ 555.211924][ T4784] ? __alloc_pages_slowpath+0x2920/0x2920 [ 555.250631][ T4784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.256874][ T4784] ? find_next_bit+0x107/0x130 [ 555.261653][ T4784] pcpu_populate_chunk+0xf8/0x940 [ 555.266667][ T4784] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 555.272372][ T4784] ? find_next_bit+0xc7/0x130 [ 555.277038][ T4784] pcpu_alloc+0xd5b/0x1380 [ 555.281446][ T4784] ? pcpu_alloc_area+0x820/0x820 [ 555.286375][ T4784] __alloc_percpu_gfp+0x28/0x30 [ 555.291213][ T4784] array_map_alloc+0x698/0x7d0 [ 555.295960][ T4784] ? array_of_map_free+0x50/0x50 [ 555.300884][ T4784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.307108][ T4784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.313344][ T4784] ? array_of_map_free+0x50/0x50 [ 555.318274][ T4784] __do_sys_bpf+0x478/0x3610 [ 555.322848][ T4784] ? bpf_prog_load+0x1960/0x1960 [ 555.327777][ T4784] ? __kasan_check_write+0x14/0x20 [ 555.332921][ T4784] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 555.338445][ T4784] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 555.343735][ T4784] ? wait_for_completion+0x440/0x440 [ 555.349022][ T4784] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 555.355263][ T4784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 555.360713][ T4784] ? do_syscall_64+0x26/0x790 [ 555.365381][ T4784] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.371492][ T4784] ? do_syscall_64+0x26/0x790 [ 555.376164][ T4784] __x64_sys_bpf+0x73/0xb0 [ 555.380569][ T4784] do_syscall_64+0xfa/0x790 [ 555.385064][ T4784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.390961][ T4784] RIP: 0033:0x45a919 [ 555.394857][ T4784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.414449][ T4784] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 555.422854][ T4784] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x19c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 555.430826][ T4784] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 555.438784][ T4784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 555.446743][ T4784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 555.454693][ T4784] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:06 executing program 2 (fault-call:0 fault-nth:11): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 555.570639][ T4799] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000540ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 555.695189][ T4817] FAULT_INJECTION: forcing a failure. [ 555.695189][ T4817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x88a8ffff00000000) [ 555.749375][ T4817] CPU: 1 PID: 4817 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 555.758019][ T4817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.758026][ T4817] Call Trace: [ 555.758053][ T4817] dump_stack+0x197/0x210 [ 555.758084][ T4817] should_fail.cold+0xa/0x15 [ 555.780988][ T4817] ? fault_create_debugfs_attr+0x180/0x180 [ 555.787158][ T4817] ? ___might_sleep+0x163/0x2c0 [ 555.792239][ T4817] should_fail_alloc_page+0x50/0x60 [ 555.798165][ T4817] __alloc_pages_nodemask+0x1a1/0x910 [ 555.803586][ T4817] ? __alloc_pages_slowpath+0x2920/0x2920 [ 555.809336][ T4817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.815594][ T4817] ? find_next_bit+0x107/0x130 [ 555.820652][ T4817] pcpu_populate_chunk+0xf8/0x940 [ 555.825692][ T4817] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 555.825709][ T4817] ? find_next_bit+0xc7/0x130 [ 555.825737][ T4817] pcpu_alloc+0xd5b/0x1380 [ 555.840838][ T4817] ? pcpu_alloc_area+0x820/0x820 [ 555.845998][ T4817] __alloc_percpu_gfp+0x28/0x30 [ 555.850891][ T4817] array_map_alloc+0x698/0x7d0 [ 555.855696][ T4817] ? array_of_map_free+0x50/0x50 [ 555.860667][ T4817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 555.867099][ T4817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 555.867119][ T4817] ? array_of_map_free+0x50/0x50 [ 555.867136][ T4817] __do_sys_bpf+0x478/0x3610 [ 555.867161][ T4817] ? bpf_prog_load+0x1960/0x1960 [ 555.887952][ T4817] ? __kasan_check_write+0x14/0x20 [ 555.893087][ T4817] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 555.898644][ T4817] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 555.898662][ T4817] ? wait_for_completion+0x440/0x440 [ 555.898686][ T4817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 555.898715][ T4817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 555.921900][ T4817] ? do_syscall_64+0x26/0x790 [ 555.926597][ T4817] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.932682][ T4817] ? do_syscall_64+0x26/0x790 [ 555.934908][ T4827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 555.937378][ T4817] __x64_sys_bpf+0x73/0xb0 [ 555.937397][ T4817] do_syscall_64+0xfa/0x790 [ 555.937420][ T4817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.961745][ T4817] RIP: 0033:0x45a919 [ 555.965822][ T4817] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.985946][ T4817] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:20:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 555.985962][ T4817] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 555.985971][ T4817] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 555.985979][ T4817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 555.985986][ T4817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 555.985993][ T4817] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:07 executing program 2 (fault-call:0 fault-nth:12): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000640ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 556.220701][ T4827] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000740ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x9effffff00000000) 14:20:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 556.518305][ T4864] FAULT_INJECTION: forcing a failure. [ 556.518305][ T4864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 556.562034][ T4864] CPU: 1 PID: 4864 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 556.571094][ T4864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.581523][ T4864] Call Trace: [ 556.585298][ T4864] dump_stack+0x197/0x210 [ 556.589751][ T4864] should_fail.cold+0xa/0x15 [ 556.594478][ T4864] ? fault_create_debugfs_attr+0x180/0x180 [ 556.600331][ T4864] ? ___might_sleep+0x163/0x2c0 [ 556.600361][ T4864] should_fail_alloc_page+0x50/0x60 [ 556.600376][ T4864] __alloc_pages_nodemask+0x1a1/0x910 [ 556.600406][ T4864] ? __alloc_pages_slowpath+0x2920/0x2920 [ 556.610552][ T4864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.610569][ T4864] ? find_next_bit+0x107/0x130 [ 556.610592][ T4864] pcpu_populate_chunk+0xf8/0x940 [ 556.610604][ T4864] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 556.610615][ T4864] ? find_next_bit+0xc7/0x130 [ 556.610638][ T4864] pcpu_alloc+0xd5b/0x1380 [ 556.610661][ T4864] ? pcpu_alloc_area+0x820/0x820 14:20:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 556.610752][ T4864] __alloc_percpu_gfp+0x28/0x30 [ 556.624687][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 556.629515][ T4864] array_map_alloc+0x698/0x7d0 [ 556.629536][ T4864] ? array_of_map_free+0x50/0x50 [ 556.629553][ T4864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 556.629567][ T4864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 556.629582][ T4864] ? array_of_map_free+0x50/0x50 [ 556.629597][ T4864] __do_sys_bpf+0x478/0x3610 [ 556.629616][ T4864] ? bpf_prog_load+0x1960/0x1960 14:20:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 556.629629][ T4864] ? __kasan_check_write+0x14/0x20 [ 556.629643][ T4864] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 556.629665][ T4864] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 556.726042][ T4864] ? wait_for_completion+0x440/0x440 [ 556.731493][ T4864] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 556.739908][ T4864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 556.745510][ T4864] ? do_syscall_64+0x26/0x790 [ 556.750332][ T4864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.757171][ T4864] ? do_syscall_64+0x26/0x790 14:20:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 556.762509][ T4864] __x64_sys_bpf+0x73/0xb0 [ 556.767038][ T4864] do_syscall_64+0xfa/0x790 [ 556.771565][ T4864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.777530][ T4864] RIP: 0033:0x45a919 [ 556.781450][ T4864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.801977][ T4864] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:20:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600560840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 556.810503][ T4864] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 556.818613][ T4864] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 556.818628][ T4864] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 556.835347][ T4864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 556.843340][ T4864] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:07 executing program 2 (fault-call:0 fault-nth:13): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 556.901649][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 557.001688][ T4892] FAULT_INJECTION: forcing a failure. [ 557.001688][ T4892] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 557.027529][ T4892] CPU: 1 PID: 4892 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 557.036301][ T4892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.046364][ T4892] Call Trace: [ 557.049711][ T4892] dump_stack+0x197/0x210 [ 557.054294][ T4892] should_fail.cold+0xa/0x15 [ 557.059091][ T4892] ? fault_create_debugfs_attr+0x180/0x180 [ 557.064916][ T4892] ? ___might_sleep+0x163/0x2c0 [ 557.069803][ T4892] should_fail_alloc_page+0x50/0x60 [ 557.075021][ T4892] __alloc_pages_nodemask+0x1a1/0x910 [ 557.080423][ T4892] ? __alloc_pages_slowpath+0x2920/0x2920 [ 557.086193][ T4892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.092667][ T4892] ? find_next_bit+0x107/0x130 [ 557.097471][ T4892] pcpu_populate_chunk+0xf8/0x940 [ 557.102533][ T4892] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 557.108295][ T4892] ? find_next_bit+0xc7/0x130 [ 557.113177][ T4892] pcpu_alloc+0xd5b/0x1380 [ 557.117657][ T4892] ? pcpu_alloc_area+0x820/0x820 [ 557.122626][ T4892] __alloc_percpu_gfp+0x28/0x30 [ 557.127752][ T4892] array_map_alloc+0x698/0x7d0 [ 557.132547][ T4892] ? array_of_map_free+0x50/0x50 [ 557.137507][ T4892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.143760][ T4892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.150015][ T4892] ? array_of_map_free+0x50/0x50 [ 557.154987][ T4892] __do_sys_bpf+0x478/0x3610 [ 557.159621][ T4892] ? bpf_prog_load+0x1960/0x1960 [ 557.164573][ T4892] ? __kasan_check_write+0x14/0x20 [ 557.169868][ T4892] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 557.175437][ T4892] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 557.180738][ T4892] ? wait_for_completion+0x440/0x440 [ 557.186045][ T4892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 557.192306][ T4892] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 557.197776][ T4892] ? do_syscall_64+0x26/0x790 [ 557.202465][ T4892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.208594][ T4892] ? do_syscall_64+0x26/0x790 [ 557.213318][ T4892] __x64_sys_bpf+0x73/0xb0 [ 557.217769][ T4892] do_syscall_64+0xfa/0x790 [ 557.222296][ T4892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.228202][ T4892] RIP: 0033:0x45a919 [ 557.232101][ T4892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.251713][ T4892] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000a40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1fc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xc3ffffff00000000) 14:20:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 557.260139][ T4892] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 557.268123][ T4892] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 557.276117][ T4892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 557.276127][ T4892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 557.276135][ T4892] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 557.357334][ T4907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x20000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:08 executing program 2 (fault-call:0 fault-nth:14): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x20400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 557.511037][ T4921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000e40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 557.575634][ T4928] FAULT_INJECTION: forcing a failure. [ 557.575634][ T4928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xf0ffffff00000000) [ 557.675294][ T4928] CPU: 1 PID: 4928 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 557.683932][ T4928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.693987][ T4928] Call Trace: [ 557.697298][ T4928] dump_stack+0x197/0x210 [ 557.701648][ T4928] should_fail.cold+0xa/0x15 [ 557.706260][ T4928] ? fault_create_debugfs_attr+0x180/0x180 [ 557.712081][ T4928] ? ___might_sleep+0x163/0x2c0 [ 557.716965][ T4928] should_fail_alloc_page+0x50/0x60 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x21c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 557.722171][ T4928] __alloc_pages_nodemask+0x1a1/0x910 [ 557.727559][ T4928] ? __alloc_pages_slowpath+0x2920/0x2920 [ 557.733300][ T4928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.739554][ T4928] ? find_next_bit+0x107/0x130 [ 557.744332][ T4928] pcpu_populate_chunk+0xf8/0x940 [ 557.749365][ T4928] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 557.755099][ T4928] ? find_next_bit+0xc7/0x130 [ 557.759974][ T4928] pcpu_alloc+0xd5b/0x1380 [ 557.764412][ T4928] ? pcpu_alloc_area+0x820/0x820 [ 557.769382][ T4928] __alloc_percpu_gfp+0x28/0x30 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x22000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 557.774250][ T4928] array_map_alloc+0x698/0x7d0 [ 557.779036][ T4928] ? array_of_map_free+0x50/0x50 [ 557.783988][ T4928] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.790229][ T4928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 557.796486][ T4928] ? array_of_map_free+0x50/0x50 [ 557.801431][ T4928] __do_sys_bpf+0x478/0x3610 [ 557.806036][ T4928] ? bpf_prog_load+0x1960/0x1960 [ 557.810976][ T4928] ? __kasan_check_write+0x14/0x20 [ 557.816089][ T4928] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x22400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 557.821642][ T4928] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 557.826946][ T4928] ? wait_for_completion+0x440/0x440 [ 557.832249][ T4928] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 557.838517][ T4928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 557.843992][ T4928] ? do_syscall_64+0x26/0x790 [ 557.848679][ T4928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.854752][ T4928] ? do_syscall_64+0x26/0x790 [ 557.859457][ T4928] __x64_sys_bpf+0x73/0xb0 [ 557.863892][ T4928] do_syscall_64+0xfa/0x790 [ 557.868413][ T4928] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x23c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 557.874321][ T4928] RIP: 0033:0x45a919 [ 557.878237][ T4928] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.897848][ T4928] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 557.906269][ T4928] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 557.914246][ T4928] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 557.922390][ T4928] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 557.930385][ T4928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 557.938374][ T4928] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 558.075984][ T4961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:09 executing program 2 (fault-call:0 fault-nth:15): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000f40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x24400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.181468][ T4966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfcffffff00000000) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600002040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 558.344060][ T4981] FAULT_INJECTION: forcing a failure. [ 558.344060][ T4981] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x25c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.420703][ T4981] CPU: 1 PID: 4981 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 558.429333][ T4981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.439400][ T4981] Call Trace: [ 558.442701][ T4981] dump_stack+0x197/0x210 [ 558.447048][ T4981] should_fail.cold+0xa/0x15 [ 558.451659][ T4981] ? fault_create_debugfs_attr+0x180/0x180 [ 558.457473][ T4981] ? ___might_sleep+0x163/0x2c0 [ 558.462349][ T4981] should_fail_alloc_page+0x50/0x60 [ 558.467553][ T4981] __alloc_pages_nodemask+0x1a1/0x910 [ 558.472937][ T4981] ? __alloc_pages_slowpath+0x2920/0x2920 [ 558.478674][ T4981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.484918][ T4981] ? find_next_bit+0x107/0x130 [ 558.489691][ T4981] pcpu_populate_chunk+0xf8/0x940 [ 558.494719][ T4981] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 558.500442][ T4981] ? find_next_bit+0xc7/0x130 [ 558.505135][ T4981] pcpu_alloc+0xd5b/0x1380 [ 558.509571][ T4981] ? pcpu_alloc_area+0x820/0x820 [ 558.514536][ T4981] __alloc_percpu_gfp+0x28/0x30 [ 558.514555][ T4981] array_map_alloc+0x698/0x7d0 [ 558.520913][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 558.524273][ T4981] ? array_of_map_free+0x50/0x50 [ 558.524298][ T4981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.542709][ T4981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.548947][ T4981] ? array_of_map_free+0x50/0x50 [ 558.548964][ T4981] __do_sys_bpf+0x478/0x3610 [ 558.548985][ T4981] ? bpf_prog_load+0x1960/0x1960 [ 558.563404][ T4981] ? __kasan_check_write+0x14/0x20 [ 558.568522][ T4981] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 558.574076][ T4981] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 558.579386][ T4981] ? wait_for_completion+0x440/0x440 [ 558.584688][ T4981] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 558.590950][ T4981] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 558.596410][ T4981] ? do_syscall_64+0x26/0x790 [ 558.601092][ T4981] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.607158][ T4981] ? do_syscall_64+0x26/0x790 [ 558.611848][ T4981] __x64_sys_bpf+0x73/0xb0 [ 558.616277][ T4981] do_syscall_64+0xfa/0x790 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x26000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.620790][ T4981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.626685][ T4981] RIP: 0033:0x45a919 [ 558.630583][ T4981] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.650189][ T4981] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 558.658606][ T4981] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x26400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.666578][ T4981] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 558.674562][ T4981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 558.682562][ T4981] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 558.690536][ T4981] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x27c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.742189][ T4988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:09 executing program 2 (fault-call:0 fault-nth:16): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600003f40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffff7f00000000) 14:20:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x28000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 558.985102][ T5019] FAULT_INJECTION: forcing a failure. [ 558.985102][ T5019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 559.036740][ T5019] CPU: 0 PID: 5019 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 559.045384][ T5019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.055445][ T5019] Call Trace: [ 559.058745][ T5019] dump_stack+0x197/0x210 [ 559.063071][ T5019] should_fail.cold+0xa/0x15 [ 559.063091][ T5019] ? fault_create_debugfs_attr+0x180/0x180 [ 559.063109][ T5019] ? ___might_sleep+0x163/0x2c0 [ 559.063137][ T5019] should_fail_alloc_page+0x50/0x60 [ 559.063148][ T5019] __alloc_pages_nodemask+0x1a1/0x910 [ 559.063167][ T5019] ? __alloc_pages_slowpath+0x2920/0x2920 [ 559.094742][ T5019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.101120][ T5019] ? find_next_bit+0x107/0x130 [ 559.105912][ T5019] pcpu_populate_chunk+0xf8/0x940 [ 559.110942][ T5019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 559.116666][ T5019] ? find_next_bit+0xc7/0x130 [ 559.121359][ T5019] pcpu_alloc+0xd5b/0x1380 [ 559.125781][ T5019] ? pcpu_alloc_area+0x820/0x820 [ 559.130722][ T5019] __alloc_percpu_gfp+0x28/0x30 [ 559.130739][ T5019] array_map_alloc+0x698/0x7d0 [ 559.130759][ T5019] ? array_of_map_free+0x50/0x50 [ 559.145275][ T5019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.151523][ T5019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.157770][ T5019] ? array_of_map_free+0x50/0x50 [ 559.157789][ T5019] __do_sys_bpf+0x478/0x3610 [ 559.157809][ T5019] ? bpf_prog_load+0x1960/0x1960 [ 559.157828][ T5019] ? __kasan_check_write+0x14/0x20 [ 559.172239][ T5019] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 559.172256][ T5019] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 559.172272][ T5019] ? wait_for_completion+0x440/0x440 [ 559.172294][ T5019] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 559.172328][ T5019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.205136][ T5019] ? do_syscall_64+0x26/0x790 [ 559.209833][ T5019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.215920][ T5019] ? do_syscall_64+0x26/0x790 [ 559.220701][ T5019] __x64_sys_bpf+0x73/0xb0 [ 559.225125][ T5019] do_syscall_64+0xfa/0x790 [ 559.229636][ T5019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.235527][ T5019] RIP: 0033:0x45a919 [ 559.239448][ T5019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.259168][ T5019] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 559.267583][ T5019] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 559.275554][ T5019] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x28400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x29c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 559.283532][ T5019] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 559.291514][ T5019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 559.299490][ T5019] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2a000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:10 executing program 2 (fault-call:0 fault-nth:17): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 559.396628][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 559.425974][ T5047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffff00000000) 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 559.577884][ T5061] FAULT_INJECTION: forcing a failure. [ 559.577884][ T5061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600004c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 559.662917][ T5061] CPU: 0 PID: 5061 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 559.671548][ T5061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.681610][ T5061] Call Trace: [ 559.684917][ T5061] dump_stack+0x197/0x210 [ 559.689264][ T5061] should_fail.cold+0xa/0x15 [ 559.693869][ T5061] ? fault_create_debugfs_attr+0x180/0x180 [ 559.699683][ T5061] ? ___might_sleep+0x163/0x2c0 [ 559.704553][ T5061] should_fail_alloc_page+0x50/0x60 [ 559.709756][ T5061] __alloc_pages_nodemask+0x1a1/0x910 [ 559.715144][ T5061] ? __alloc_pages_slowpath+0x2920/0x2920 [ 559.720877][ T5061] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.727126][ T5061] ? find_next_bit+0x107/0x130 [ 559.731905][ T5061] pcpu_populate_chunk+0xf8/0x940 [ 559.736972][ T5061] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 559.742698][ T5061] ? find_next_bit+0xc7/0x130 [ 559.747392][ T5061] pcpu_alloc+0xd5b/0x1380 [ 559.751827][ T5061] ? pcpu_alloc_area+0x820/0x820 [ 559.756787][ T5061] __alloc_percpu_gfp+0x28/0x30 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 559.761643][ T5061] array_map_alloc+0x698/0x7d0 [ 559.766422][ T5061] ? array_of_map_free+0x50/0x50 [ 559.771367][ T5061] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 559.777612][ T5061] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.783858][ T5061] ? array_of_map_free+0x50/0x50 [ 559.788801][ T5061] __do_sys_bpf+0x478/0x3610 [ 559.793424][ T5061] ? bpf_prog_load+0x1960/0x1960 [ 559.798358][ T5061] ? __kasan_check_write+0x14/0x20 [ 559.803474][ T5061] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 559.809023][ T5061] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 559.814310][ T5061] ? wait_for_completion+0x440/0x440 [ 559.819611][ T5061] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 559.825879][ T5061] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.831340][ T5061] ? do_syscall_64+0x26/0x790 [ 559.836018][ T5061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.842083][ T5061] ? do_syscall_64+0x26/0x790 [ 559.846770][ T5061] __x64_sys_bpf+0x73/0xb0 [ 559.851205][ T5061] do_syscall_64+0xfa/0x790 [ 559.855731][ T5061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.861642][ T5061] RIP: 0033:0x45a919 [ 559.865545][ T5061] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.885148][ T5061] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 559.893567][ T5061] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 559.893576][ T5061] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 559.893584][ T5061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 559.893591][ T5061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 559.893599][ T5061] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 559.913073][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:10 executing program 2 (fault-call:0 fault-nth:18): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 560.086592][ T5085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0004000) 14:20:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600085640ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 560.201796][ T5099] FAULT_INJECTION: forcing a failure. [ 560.201796][ T5099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 560.264556][ T5099] CPU: 0 PID: 5099 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 560.273187][ T5099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.283247][ T5099] Call Trace: [ 560.286541][ T5099] dump_stack+0x197/0x210 [ 560.290873][ T5099] should_fail.cold+0xa/0x15 [ 560.290892][ T5099] ? fault_create_debugfs_attr+0x180/0x180 [ 560.290909][ T5099] ? ___might_sleep+0x163/0x2c0 [ 560.290946][ T5099] should_fail_alloc_page+0x50/0x60 14:20:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x2fc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 560.311343][ T5099] __alloc_pages_nodemask+0x1a1/0x910 [ 560.316731][ T5099] ? __alloc_pages_slowpath+0x2920/0x2920 [ 560.322469][ T5099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.328726][ T5099] ? find_next_bit+0x107/0x130 [ 560.333507][ T5099] pcpu_populate_chunk+0xf8/0x940 [ 560.338637][ T5099] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 560.338658][ T5099] ? find_next_bit+0xc7/0x130 [ 560.349033][ T5099] pcpu_alloc+0xd5b/0x1380 [ 560.353471][ T5099] ? pcpu_alloc_area+0x820/0x820 [ 560.358435][ T5099] __alloc_percpu_gfp+0x28/0x30 14:20:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600655840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 560.363294][ T5099] array_map_alloc+0x698/0x7d0 [ 560.363318][ T5099] ? array_of_map_free+0x50/0x50 [ 560.372996][ T5099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.379247][ T5099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.385497][ T5099] ? array_of_map_free+0x50/0x50 [ 560.390449][ T5099] __do_sys_bpf+0x478/0x3610 [ 560.395052][ T5099] ? bpf_prog_load+0x1960/0x1960 [ 560.399992][ T5099] ? __kasan_check_write+0x14/0x20 [ 560.400008][ T5099] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x30000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 560.400034][ T5099] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 560.415920][ T5099] ? wait_for_completion+0x440/0x440 [ 560.415947][ T5099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.415977][ T5099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.432897][ T5099] ? do_syscall_64+0x26/0x790 [ 560.437582][ T5099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.443654][ T5099] ? do_syscall_64+0x26/0x790 [ 560.448346][ T5099] __x64_sys_bpf+0x73/0xb0 [ 560.452771][ T5099] do_syscall_64+0xfa/0x790 [ 560.452794][ T5099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.452806][ T5099] RIP: 0033:0x45a919 [ 560.452823][ T5099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.463167][ T5099] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 560.463181][ T5099] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 560.463191][ T5099] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 560.463199][ T5099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.463208][ T5099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 560.463216][ T5099] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:11 executing program 2 (fault-call:0 fault-nth:19): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x30400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 560.675162][ T5129] FAULT_INJECTION: forcing a failure. [ 560.675162][ T5129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 560.703022][ T5129] CPU: 1 PID: 5129 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 560.711640][ T5129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.721696][ T5129] Call Trace: [ 560.725002][ T5129] dump_stack+0x197/0x210 [ 560.729359][ T5129] should_fail.cold+0xa/0x15 [ 560.733965][ T5129] ? fault_create_debugfs_attr+0x180/0x180 [ 560.739769][ T5129] ? ___might_sleep+0x163/0x2c0 [ 560.739801][ T5129] should_fail_alloc_page+0x50/0x60 [ 560.739815][ T5129] __alloc_pages_nodemask+0x1a1/0x910 [ 560.739838][ T5129] ? __alloc_pages_slowpath+0x2920/0x2920 [ 560.739861][ T5129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.739874][ T5129] ? find_next_bit+0x107/0x130 14:20:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 560.739894][ T5129] pcpu_populate_chunk+0xf8/0x940 [ 560.749898][ T5129] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 560.749913][ T5129] ? find_next_bit+0xc7/0x130 [ 560.749937][ T5129] pcpu_alloc+0xd5b/0x1380 [ 560.749965][ T5129] ? pcpu_alloc_area+0x820/0x820 [ 560.749993][ T5129] __alloc_percpu_gfp+0x28/0x30 [ 560.750011][ T5129] array_map_alloc+0x698/0x7d0 [ 560.750032][ T5129] ? array_of_map_free+0x50/0x50 [ 560.750057][ T5129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 560.767325][ T5129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.767345][ T5129] ? array_of_map_free+0x50/0x50 [ 560.767364][ T5129] __do_sys_bpf+0x478/0x3610 [ 560.767386][ T5129] ? bpf_prog_load+0x1960/0x1960 [ 560.777140][ T5129] ? __kasan_check_write+0x14/0x20 [ 560.777156][ T5129] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 560.777173][ T5129] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 560.777188][ T5129] ? wait_for_completion+0x440/0x440 [ 560.777216][ T5129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.792066][ T5129] ? trace_hardirqs_on_thunk+0x1a/0x1c 14:20:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x31c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0008000) [ 560.792082][ T5129] ? do_syscall_64+0x26/0x790 [ 560.792097][ T5129] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.792114][ T5129] ? do_syscall_64+0x26/0x790 [ 560.801877][ T5129] __x64_sys_bpf+0x73/0xb0 [ 560.801903][ T5129] do_syscall_64+0xfa/0x790 [ 560.801927][ T5129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.801943][ T5129] RIP: 0033:0x45a919 [ 560.801958][ T5129] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:20:11 executing program 2 (fault-call:0 fault-nth:20): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 560.801965][ T5129] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 560.801978][ T5129] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 560.801987][ T5129] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 560.801993][ T5129] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.802001][ T5129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 560.802009][ T5129] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x32000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.068541][ T5151] FAULT_INJECTION: forcing a failure. [ 561.068541][ T5151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 561.083516][ T5151] CPU: 0 PID: 5151 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 561.092128][ T5151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.102194][ T5151] Call Trace: [ 561.105504][ T5151] dump_stack+0x197/0x210 [ 561.109849][ T5151] should_fail.cold+0xa/0x15 14:20:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa000a000) 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x32400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.114473][ T5151] ? fault_create_debugfs_attr+0x180/0x180 [ 561.120306][ T5151] ? ___might_sleep+0x163/0x2c0 [ 561.125180][ T5151] should_fail_alloc_page+0x50/0x60 [ 561.130382][ T5151] __alloc_pages_nodemask+0x1a1/0x910 [ 561.135767][ T5151] ? __alloc_pages_slowpath+0x2920/0x2920 [ 561.141501][ T5151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.147747][ T5151] ? find_next_bit+0x107/0x130 [ 561.152525][ T5151] pcpu_populate_chunk+0xf8/0x940 [ 561.157553][ T5151] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 561.163291][ T5151] ? find_next_bit+0xc7/0x130 [ 561.167984][ T5151] pcpu_alloc+0xd5b/0x1380 [ 561.172420][ T5151] ? pcpu_alloc_area+0x820/0x820 [ 561.177385][ T5151] __alloc_percpu_gfp+0x28/0x30 [ 561.182252][ T5151] array_map_alloc+0x698/0x7d0 [ 561.187029][ T5151] ? array_of_map_free+0x50/0x50 [ 561.191983][ T5151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.198238][ T5151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.204493][ T5151] ? array_of_map_free+0x50/0x50 [ 561.209445][ T5151] __do_sys_bpf+0x478/0x3610 [ 561.214050][ T5151] ? bpf_prog_load+0x1960/0x1960 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x33c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.218996][ T5151] ? __kasan_check_write+0x14/0x20 [ 561.224112][ T5151] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 561.229659][ T5151] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 561.229683][ T5151] ? wait_for_completion+0x440/0x440 [ 561.229709][ T5151] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.229738][ T5151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.229756][ T5151] ? do_syscall_64+0x26/0x790 [ 561.246520][ T5151] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.246537][ T5151] ? do_syscall_64+0x26/0x790 [ 561.246565][ T5151] __x64_sys_bpf+0x73/0xb0 [ 561.246584][ T5151] do_syscall_64+0xfa/0x790 [ 561.276323][ T5151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.282213][ T5151] RIP: 0033:0x45a919 [ 561.282229][ T5151] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.282238][ T5151] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x34000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600586540ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 561.282253][ T5151] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 561.282262][ T5151] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 561.282269][ T5151] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 561.282281][ T5151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 561.305764][ T5151] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:12 executing program 2 (fault-call:0 fault-nth:21): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xffffffffa0010000) 14:20:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x34400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006840ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 561.505652][ T5180] FAULT_INJECTION: forcing a failure. [ 561.505652][ T5180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x35c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.547563][ T5180] CPU: 0 PID: 5180 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 561.556196][ T5180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.566257][ T5180] Call Trace: [ 561.569561][ T5180] dump_stack+0x197/0x210 [ 561.573905][ T5180] should_fail.cold+0xa/0x15 [ 561.578514][ T5180] ? fault_create_debugfs_attr+0x180/0x180 [ 561.578534][ T5180] ? ___might_sleep+0x163/0x2c0 [ 561.578562][ T5180] should_fail_alloc_page+0x50/0x60 14:20:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0xfffffffffffff000) [ 561.578573][ T5180] __alloc_pages_nodemask+0x1a1/0x910 [ 561.578592][ T5180] ? __alloc_pages_slowpath+0x2920/0x2920 [ 561.594421][ T5180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.611701][ T5180] ? find_next_bit+0x107/0x130 [ 561.616495][ T5180] pcpu_populate_chunk+0xf8/0x940 [ 561.621528][ T5180] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 561.627244][ T5180] ? find_next_bit+0xc7/0x130 [ 561.627272][ T5180] pcpu_alloc+0xd5b/0x1380 [ 561.627303][ T5180] ? pcpu_alloc_area+0x820/0x820 [ 561.641317][ T5180] __alloc_percpu_gfp+0x28/0x30 [ 561.646189][ T5180] array_map_alloc+0x698/0x7d0 [ 561.650963][ T5180] ? array_of_map_free+0x50/0x50 [ 561.650985][ T5180] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 561.651004][ T5180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.668391][ T5180] ? array_of_map_free+0x50/0x50 [ 561.668409][ T5180] __do_sys_bpf+0x478/0x3610 [ 561.668432][ T5180] ? bpf_prog_load+0x1960/0x1960 [ 561.668446][ T5180] ? __kasan_check_write+0x14/0x20 [ 561.668466][ T5180] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x36000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.693524][ T5180] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 561.698823][ T5180] ? wait_for_completion+0x440/0x440 [ 561.698849][ T5180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.698883][ T5180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.698895][ T5180] ? do_syscall_64+0x26/0x790 [ 561.698914][ T5180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.726727][ T5180] ? do_syscall_64+0x26/0x790 [ 561.726753][ T5180] __x64_sys_bpf+0x73/0xb0 [ 561.726772][ T5180] do_syscall_64+0xfa/0x790 [ 561.726794][ T5180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.726806][ T5180] RIP: 0033:0x45a919 [ 561.726827][ T5180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.740385][ T5180] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 561.769854][ T5180] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 561.769863][ T5180] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:12 executing program 2 (fault-call:0 fault-nth:22): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 561.769870][ T5180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 561.769877][ T5180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 561.769884][ T5180] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600006c40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r0, &(0x7f0000000c00)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000c40)={r4}) 14:20:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x36400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 562.001784][ T5209] FAULT_INJECTION: forcing a failure. [ 562.001784][ T5209] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 562.089340][ T5209] CPU: 1 PID: 5209 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 562.097995][ T5209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.109644][ T5209] Call Trace: [ 562.112971][ T5209] dump_stack+0x197/0x210 [ 562.117329][ T5209] should_fail.cold+0xa/0x15 [ 562.121937][ T5209] ? fault_create_debugfs_attr+0x180/0x180 [ 562.127759][ T5209] ? ___might_sleep+0x163/0x2c0 [ 562.132633][ T5209] should_fail_alloc_page+0x50/0x60 [ 562.137844][ T5209] __alloc_pages_nodemask+0x1a1/0x910 [ 562.143228][ T5209] ? __alloc_pages_slowpath+0x2920/0x2920 [ 562.148966][ T5209] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.155211][ T5209] ? find_next_bit+0x107/0x130 [ 562.159993][ T5209] pcpu_populate_chunk+0xf8/0x940 [ 562.165028][ T5209] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 562.170749][ T5209] ? find_next_bit+0xc7/0x130 [ 562.175445][ T5209] pcpu_alloc+0xd5b/0x1380 [ 562.179493][ T5227] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 562.179873][ T5209] ? pcpu_alloc_area+0x820/0x820 [ 562.192069][ T5209] __alloc_percpu_gfp+0x28/0x30 [ 562.196923][ T5209] array_map_alloc+0x698/0x7d0 [ 562.201701][ T5209] ? array_of_map_free+0x50/0x50 [ 562.206653][ T5209] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.212893][ T5209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.219139][ T5209] ? array_of_map_free+0x50/0x50 [ 562.224086][ T5209] __do_sys_bpf+0x478/0x3610 [ 562.228686][ T5209] ? bpf_prog_load+0x1960/0x1960 [ 562.233680][ T5209] ? __kasan_check_write+0x14/0x20 [ 562.238804][ T5209] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 562.244389][ T5209] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 562.249692][ T5209] ? wait_for_completion+0x440/0x440 [ 562.255023][ T5209] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 562.261413][ T5209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 562.266893][ T5209] ? do_syscall_64+0x26/0x790 [ 562.271602][ T5209] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.277686][ T5209] ? do_syscall_64+0x26/0x790 [ 562.282388][ T5209] __x64_sys_bpf+0x73/0xb0 14:20:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x37c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x38000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 562.286854][ T5209] do_syscall_64+0xfa/0x790 [ 562.291375][ T5209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.297278][ T5209] RIP: 0033:0x45a919 [ 562.301185][ T5209] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 562.320912][ T5209] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 562.329337][ T5209] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600007440ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 562.337321][ T5209] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 562.345301][ T5209] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 562.353279][ T5209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 562.361253][ T5209] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x38400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 562.483727][ T5223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:13 executing program 2 (fault-call:0 fault-nth:23): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600007a40ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x39c00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r2, r1, 0x8000000000d}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r2, 0x0, r3, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x2e9ef9a012bf923e, 0x70, 0x2, 0x3, 0xd6, 0x8, 0x0, 0xf39a, 0x8020, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x101, 0x80}, 0x8, 0x2, 0xe5, 0x5, 0x0, 0x7, 0x2}, r2, 0x10, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 562.776363][ T5259] FAULT_INJECTION: forcing a failure. [ 562.776363][ T5259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 562.825389][ T5259] CPU: 0 PID: 5259 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 562.834019][ T5259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.844071][ T5259] Call Trace: [ 562.847371][ T5259] dump_stack+0x197/0x210 [ 562.851715][ T5259] should_fail.cold+0xa/0x15 [ 562.856317][ T5259] ? fault_create_debugfs_attr+0x180/0x180 [ 562.862142][ T5259] ? ___might_sleep+0x163/0x2c0 [ 562.867015][ T5259] should_fail_alloc_page+0x50/0x60 [ 562.872221][ T5259] __alloc_pages_nodemask+0x1a1/0x910 [ 562.877608][ T5259] ? __alloc_pages_slowpath+0x2920/0x2920 [ 562.883345][ T5259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.889589][ T5259] ? find_next_bit+0x107/0x130 [ 562.894368][ T5259] pcpu_populate_chunk+0xf8/0x940 [ 562.899400][ T5259] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 562.905111][ T5259] ? find_next_bit+0xc7/0x130 [ 562.909782][ T5259] pcpu_alloc+0xd5b/0x1380 [ 562.914190][ T5259] ? pcpu_alloc_area+0x820/0x820 [ 562.919120][ T5259] __alloc_percpu_gfp+0x28/0x30 [ 562.923963][ T5259] array_map_alloc+0x698/0x7d0 [ 562.928712][ T5259] ? array_of_map_free+0x50/0x50 [ 562.933638][ T5259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 562.939859][ T5259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 562.946084][ T5259] ? array_of_map_free+0x50/0x50 [ 562.951007][ T5259] __do_sys_bpf+0x478/0x3610 [ 562.955585][ T5259] ? bpf_prog_load+0x1960/0x1960 [ 562.960507][ T5259] ? __kasan_check_write+0x14/0x20 [ 562.965599][ T5259] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 562.971139][ T5259] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 562.976409][ T5259] ? wait_for_completion+0x440/0x440 [ 562.981683][ T5259] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 562.987921][ T5259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 562.993369][ T5259] ? do_syscall_64+0x26/0x790 [ 562.998031][ T5259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.004080][ T5259] ? do_syscall_64+0x26/0x790 [ 563.008757][ T5259] __x64_sys_bpf+0x73/0xb0 [ 563.013161][ T5259] do_syscall_64+0xfa/0x790 [ 563.017780][ T5259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.023665][ T5259] RIP: 0033:0x45a919 [ 563.027552][ T5259] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 563.047142][ T5259] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 563.055539][ T5259] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 563.063493][ T5259] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3a000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600008140ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 563.071450][ T5259] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 563.079414][ T5259] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 563.087385][ T5259] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:14 executing program 2 (fault-call:0 fault-nth:24): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3a400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000f040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 563.437583][ T5292] FAULT_INJECTION: forcing a failure. [ 563.437583][ T5292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 563.489290][ T5292] CPU: 1 PID: 5292 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 563.498626][ T5292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.508691][ T5292] Call Trace: [ 563.512007][ T5292] dump_stack+0x197/0x210 [ 563.516374][ T5292] should_fail.cold+0xa/0x15 [ 563.520992][ T5292] ? fault_create_debugfs_attr+0x180/0x180 [ 563.526904][ T5292] ? ___might_sleep+0x163/0x2c0 [ 563.531886][ T5292] should_fail_alloc_page+0x50/0x60 14:20:14 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000031540)={&(0x7f0000030040)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000031400)=[{&(0x7f00000300c0)=""/216, 0xd8}, {&(0x7f00000301c0)=""/4096, 0x1000}, {&(0x7f00000311c0)=""/251, 0xfb}, {&(0x7f00000312c0)=""/55, 0x37}, {&(0x7f0000031300)=""/24, 0x18}, {&(0x7f0000031340)=""/153, 0x99}], 0x6, &(0x7f0000031480)=""/189, 0xbd}, 0x180e0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020de82ca21121"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000000)="4be624e60b8588ae2b8961abc53c", 0x0}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000031600)={0x17, 0x7, &(0x7f0000001300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1cf6, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000001340)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000013c0)=""/191, 0x0, 0xa, [], r3, 0x0, r4, 0x8, &(0x7f0000031580)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000315c0)={0x5, 0x7, 0x2, 0x101}, 0x10, 0xffffffffffffffff, r5}, 0x78) sendmsg$sock(r1, &(0x7f0000000440)={&(0x7f0000000280)=@xdp={0x2c, 0x4, r3, 0x38}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)="6eb22f182abb2f83c02243380ec4788c63b8", 0x12}, {&(0x7f0000000300)="e7d9064a1bbedc9dbe1c93443a6733e6d5be2ee40a57ed81434b1591eb9096f25364b9ad8fd7c41d92971cf6becbbaad2e0209965a53e65edeeb1d9ced540fb3c0b5de99dab03d953943652fcd3156d0349329ba343453324df4718f8beb5b1e42b4", 0x62}], 0x2, &(0x7f00000003c0)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x18}, 0x20000000) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r7 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x40, 0x6, 0x40, 0x4b, 0x0, 0x9, 0xfc725102bb0677bc, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x3c1f, 0x400, 0x5, 0x4, 0x29db, 0x35, 0x101}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x9, 0x9, 0x81, 0x20, 0x0, 0x100000000, 0x4002, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x98f3, 0x0, @perf_config_ext={0x1, 0xb0de}, 0x7427e9ef5d23adee, 0x2, 0x3, 0x8, 0x7, 0x1, 0x6}, 0xffffffffffffffff, 0x4, r7, 0x5) [ 563.537359][ T5292] __alloc_pages_nodemask+0x1a1/0x910 [ 563.542846][ T5292] ? __alloc_pages_slowpath+0x2920/0x2920 [ 563.548594][ T5292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.554953][ T5292] ? find_next_bit+0x107/0x130 [ 563.559743][ T5292] pcpu_populate_chunk+0xf8/0x940 [ 563.564782][ T5292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 563.571136][ T5292] ? find_next_bit+0xc7/0x130 [ 563.579245][ T5292] pcpu_alloc+0xd5b/0x1380 [ 563.583703][ T5292] ? pcpu_alloc_area+0x820/0x820 14:20:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 563.588677][ T5292] __alloc_percpu_gfp+0x28/0x30 [ 563.593541][ T5292] array_map_alloc+0x698/0x7d0 [ 563.598686][ T5292] ? array_of_map_free+0x50/0x50 [ 563.603651][ T5292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 563.609910][ T5292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.616179][ T5292] ? array_of_map_free+0x50/0x50 [ 563.621231][ T5292] __do_sys_bpf+0x478/0x3610 [ 563.626118][ T5292] ? bpf_prog_load+0x1960/0x1960 [ 563.631333][ T5292] ? __kasan_check_write+0x14/0x20 14:20:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 563.637075][ T5292] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 563.642647][ T5292] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 563.647968][ T5292] ? wait_for_completion+0x440/0x440 [ 563.653633][ T5292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.660153][ T5292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 563.666273][ T5292] ? do_syscall_64+0x26/0x790 [ 563.670973][ T5292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.677050][ T5292] ? do_syscall_64+0x26/0x790 [ 563.681746][ T5292] __x64_sys_bpf+0x73/0xb0 14:20:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3bc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 563.686188][ T5292] do_syscall_64+0xfa/0x790 [ 563.690703][ T5292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.696705][ T5292] RIP: 0033:0x45a919 [ 563.696727][ T5292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 563.720215][ T5292] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 563.723923][ T5307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 563.728726][ T5292] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 563.728735][ T5292] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 563.728742][ T5292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 563.728749][ T5292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 563.728756][ T5292] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:14 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:20:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:14 executing program 2 (fault-call:0 fault-nth:25): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:14 executing program 0: socketpair(0x11, 0x2, 0xf3, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080), 0x4) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmsg$kcm(r3, &(0x7f0000002500)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000280)=""/210, 0xd2}, {&(0x7f0000000380)=""/27, 0x1b}, {&(0x7f00000003c0)=""/8, 0x8}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/32, 0x20}], 0x5, &(0x7f0000001500)=""/4096, 0x1000}, 0x40000102) 14:20:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000003ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:20:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 564.148481][ T5332] FAULT_INJECTION: forcing a failure. [ 564.148481][ T5332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 564.221811][ T5332] CPU: 1 PID: 5332 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 564.230591][ T5332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.240654][ T5332] Call Trace: [ 564.243966][ T5332] dump_stack+0x197/0x210 [ 564.248322][ T5332] should_fail.cold+0xa/0x15 [ 564.252940][ T5332] ? fault_create_debugfs_attr+0x180/0x180 [ 564.259732][ T5332] ? ___might_sleep+0x163/0x2c0 [ 564.264625][ T5332] should_fail_alloc_page+0x50/0x60 [ 564.269834][ T5332] __alloc_pages_nodemask+0x1a1/0x910 [ 564.269854][ T5332] ? __alloc_pages_slowpath+0x2920/0x2920 [ 564.269877][ T5332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.269891][ T5332] ? find_next_bit+0x107/0x130 [ 564.269912][ T5332] pcpu_populate_chunk+0xf8/0x940 [ 564.269932][ T5332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 564.297026][ T5332] ? find_next_bit+0xc7/0x130 [ 564.297052][ T5332] pcpu_alloc+0xd5b/0x1380 [ 564.311876][ T5332] ? pcpu_alloc_area+0x820/0x820 [ 564.316849][ T5332] __alloc_percpu_gfp+0x28/0x30 [ 564.321722][ T5332] array_map_alloc+0x698/0x7d0 [ 564.326503][ T5332] ? array_of_map_free+0x50/0x50 [ 564.331456][ T5332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.335822][ T5337] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 564.337702][ T5332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 564.337719][ T5332] ? array_of_map_free+0x50/0x50 [ 564.337739][ T5332] __do_sys_bpf+0x478/0x3610 [ 564.360743][ T5332] ? bpf_prog_load+0x1960/0x1960 [ 564.365691][ T5332] ? __kasan_check_write+0x14/0x20 [ 564.370806][ T5332] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 564.376366][ T5332] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 564.381658][ T5332] ? wait_for_completion+0x440/0x440 [ 564.386970][ T5332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 564.393237][ T5332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 564.398719][ T5332] ? do_syscall_64+0x26/0x790 [ 564.403405][ T5332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.403979][ T5344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 564.409472][ T5332] ? do_syscall_64+0x26/0x790 [ 564.409496][ T5332] __x64_sys_bpf+0x73/0xb0 [ 564.409513][ T5332] do_syscall_64+0xfa/0x790 [ 564.409534][ T5332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.409546][ T5332] RIP: 0033:0x45a919 [ 564.409561][ T5332] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 564.409568][ T5332] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 564.409581][ T5332] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 564.409589][ T5332] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 564.409596][ T5332] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 564.409603][ T5332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 564.409610][ T5332] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:15 executing program 2 (fault-call:0 fault-nth:26): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 564.519530][ T5351] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 564.583393][ T5357] FAULT_INJECTION: forcing a failure. [ 564.583393][ T5357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 564.607362][ T5357] CPU: 0 PID: 5357 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 564.615990][ T5357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.626037][ T5357] Call Trace: [ 564.629333][ T5357] dump_stack+0x197/0x210 [ 564.633650][ T5357] should_fail.cold+0xa/0x15 [ 564.638228][ T5357] ? fault_create_debugfs_attr+0x180/0x180 [ 564.644019][ T5357] ? ___might_sleep+0x163/0x2c0 [ 564.648889][ T5357] should_fail_alloc_page+0x50/0x60 [ 564.654106][ T5357] __alloc_pages_nodemask+0x1a1/0x910 [ 564.659584][ T5357] ? __alloc_pages_slowpath+0x2920/0x2920 [ 564.665306][ T5357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.671536][ T5357] ? find_next_bit+0x107/0x130 [ 564.676299][ T5357] pcpu_populate_chunk+0xf8/0x940 [ 564.681311][ T5357] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 564.687017][ T5357] ? find_next_bit+0xc7/0x130 [ 564.691686][ T5357] pcpu_alloc+0xd5b/0x1380 [ 564.696093][ T5357] ? pcpu_alloc_area+0x820/0x820 [ 564.701022][ T5357] __alloc_percpu_gfp+0x28/0x30 [ 564.705860][ T5357] array_map_alloc+0x698/0x7d0 [ 564.710611][ T5357] ? array_of_map_free+0x50/0x50 [ 564.715532][ T5357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 564.721753][ T5357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 564.727980][ T5357] ? array_of_map_free+0x50/0x50 [ 564.732993][ T5357] __do_sys_bpf+0x478/0x3610 [ 564.737569][ T5357] ? bpf_prog_load+0x1960/0x1960 [ 564.742489][ T5357] ? __kasan_check_write+0x14/0x20 [ 564.747582][ T5357] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 564.753555][ T5357] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 564.758822][ T5357] ? wait_for_completion+0x440/0x440 [ 564.764094][ T5357] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 564.770330][ T5357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 564.775770][ T5357] ? do_syscall_64+0x26/0x790 [ 564.780429][ T5357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.786478][ T5357] ? do_syscall_64+0x26/0x790 [ 564.791140][ T5357] __x64_sys_bpf+0x73/0xb0 [ 564.795538][ T5357] do_syscall_64+0xfa/0x790 [ 564.800025][ T5357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.805896][ T5357] RIP: 0033:0x45a919 [ 564.809777][ T5357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 564.829361][ T5357] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 564.837754][ T5357] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 564.845707][ T5357] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 564.853658][ T5357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 564.861610][ T5357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 564.869559][ T5357] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3dc00, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000005ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:15 executing program 2 (fault-call:0 fault-nth:27): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 564.890471][ T5358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:20:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 14:20:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 565.061885][ T5369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.114706][ T5375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.140691][ T5377] FAULT_INJECTION: forcing a failure. [ 565.140691][ T5377] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 565.183417][ T5377] CPU: 1 PID: 5377 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 565.192057][ T5377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.194246][ T5382] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.202120][ T5377] Call Trace: [ 565.202151][ T5377] dump_stack+0x197/0x210 [ 565.202180][ T5377] should_fail.cold+0xa/0x15 [ 565.202203][ T5377] ? fault_create_debugfs_attr+0x180/0x180 [ 565.202223][ T5377] ? ___might_sleep+0x163/0x2c0 [ 565.202257][ T5377] should_fail_alloc_page+0x50/0x60 [ 565.202271][ T5377] __alloc_pages_nodemask+0x1a1/0x910 [ 565.202294][ T5377] ? __alloc_pages_slowpath+0x2920/0x2920 [ 565.221777][ T5377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.232388][ T5377] ? find_next_bit+0x107/0x130 [ 565.232416][ T5377] pcpu_populate_chunk+0xf8/0x940 [ 565.232431][ T5377] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 565.232443][ T5377] ? find_next_bit+0xc7/0x130 [ 565.232473][ T5377] pcpu_alloc+0xd5b/0x1380 [ 565.232508][ T5377] ? pcpu_alloc_area+0x820/0x820 [ 565.284630][ T5377] __alloc_percpu_gfp+0x28/0x30 [ 565.289486][ T5377] array_map_alloc+0x698/0x7d0 [ 565.294250][ T5377] ? array_of_map_free+0x50/0x50 [ 565.299182][ T5377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.305416][ T5377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.311648][ T5377] ? array_of_map_free+0x50/0x50 [ 565.316576][ T5377] __do_sys_bpf+0x478/0x3610 [ 565.321172][ T5377] ? bpf_prog_load+0x1960/0x1960 [ 565.326124][ T5377] ? __kasan_check_write+0x14/0x20 [ 565.331260][ T5377] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 565.336828][ T5377] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 565.342112][ T5377] ? wait_for_completion+0x440/0x440 [ 565.347410][ T5377] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 565.353673][ T5377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 565.359130][ T5377] ? do_syscall_64+0x26/0x790 [ 565.363799][ T5377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.369852][ T5377] ? do_syscall_64+0x26/0x790 [ 565.374538][ T5377] __x64_sys_bpf+0x73/0xb0 [ 565.378946][ T5377] do_syscall_64+0xfa/0x790 [ 565.383441][ T5377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.389317][ T5377] RIP: 0033:0x45a919 [ 565.393198][ T5377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.412791][ T5377] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 565.421190][ T5377] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3e000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000006ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 565.429149][ T5377] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 565.437106][ T5377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 565.445067][ T5377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 565.453024][ T5377] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:16 executing program 2 (fault-call:0 fault-nth:28): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3e400, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:16 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) [ 565.650577][ T5393] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.712586][ T5403] FAULT_INJECTION: forcing a failure. [ 565.712586][ T5403] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 565.735884][ T5406] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 565.774003][ T5403] CPU: 1 PID: 5403 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 565.782643][ T5403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.792705][ T5403] Call Trace: [ 565.796015][ T5403] dump_stack+0x197/0x210 [ 565.800618][ T5403] should_fail.cold+0xa/0x15 [ 565.800639][ T5403] ? fault_create_debugfs_attr+0x180/0x180 [ 565.800655][ T5403] ? ___might_sleep+0x163/0x2c0 [ 565.800679][ T5403] should_fail_alloc_page+0x50/0x60 [ 565.800697][ T5403] __alloc_pages_nodemask+0x1a1/0x910 [ 565.811073][ T5403] ? __alloc_pages_slowpath+0x2920/0x2920 [ 565.811097][ T5403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.811111][ T5403] ? find_next_bit+0x107/0x130 [ 565.811132][ T5403] pcpu_populate_chunk+0xf8/0x940 [ 565.811146][ T5403] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 565.811159][ T5403] ? find_next_bit+0xc7/0x130 [ 565.811181][ T5403] pcpu_alloc+0xd5b/0x1380 [ 565.811204][ T5403] ? pcpu_alloc_area+0x820/0x820 [ 565.811233][ T5403] __alloc_percpu_gfp+0x28/0x30 [ 565.872786][ T5403] array_map_alloc+0x698/0x7d0 [ 565.877565][ T5403] ? array_of_map_free+0x50/0x50 [ 565.882525][ T5403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 565.888774][ T5403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 565.895023][ T5403] ? array_of_map_free+0x50/0x50 [ 565.899964][ T5403] __do_sys_bpf+0x478/0x3610 [ 565.899986][ T5403] ? bpf_prog_load+0x1960/0x1960 [ 565.900001][ T5403] ? __kasan_check_write+0x14/0x20 [ 565.900014][ T5403] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 565.900030][ T5403] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 565.900045][ T5403] ? wait_for_completion+0x440/0x440 [ 565.900070][ T5403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 565.900100][ T5403] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 565.900121][ T5403] ? do_syscall_64+0x26/0x790 [ 565.900136][ T5403] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.900150][ T5403] ? do_syscall_64+0x26/0x790 [ 565.900171][ T5403] __x64_sys_bpf+0x73/0xb0 [ 565.900189][ T5403] do_syscall_64+0xfa/0x790 [ 565.900212][ T5403] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:20:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:16 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000480)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000000200)=""/204, 0xcc}], 0x2, &(0x7f0000000300)=""/205, 0xcd}, 0x3100) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) close(r3) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000005c0)=0x80000001) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) close(r2) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x3, 0x56, 0x9, 0x3, 0x0, 0x101, 0x2000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x6, @perf_bp={&(0x7f0000000140), 0x6}, 0x80, 0x9, 0xa87, 0x0, 0x6, 0x4dbc, 0xe0d9}, 0x0, 0xc, r2, 0x3) [ 565.914812][ T5403] RIP: 0033:0x45a919 [ 565.957896][ T5403] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.957905][ T5403] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 565.957923][ T5403] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 565.973382][ T5403] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000007ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 565.973391][ T5403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 565.973399][ T5403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 565.973406][ T5403] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 566.061616][ T5416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:17 executing program 2 (fault-call:0 fault-nth:29): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) 14:20:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 566.156830][ T5416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 566.229651][ T5427] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.292171][ T5432] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.330710][ T5436] FAULT_INJECTION: forcing a failure. 14:20:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) close(r1) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe68, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) r5 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x8, 0x6, 0x4, 0x7, 0x0, 0x80000000, 0x40, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xa}, 0x10, 0x5, 0x8, 0x6, 0xffffffff, 0x5}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 566.330710][ T5436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 566.372610][ T5436] CPU: 0 PID: 5436 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 566.381229][ T5436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.381236][ T5436] Call Trace: [ 566.381262][ T5436] dump_stack+0x197/0x210 [ 566.381285][ T5436] should_fail.cold+0xa/0x15 [ 566.381303][ T5436] ? fault_create_debugfs_attr+0x180/0x180 [ 566.381319][ T5436] ? ___might_sleep+0x163/0x2c0 [ 566.381346][ T5436] should_fail_alloc_page+0x50/0x60 [ 566.381361][ T5436] __alloc_pages_nodemask+0x1a1/0x910 [ 566.381382][ T5436] ? __alloc_pages_slowpath+0x2920/0x2920 [ 566.381405][ T5436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.381418][ T5436] ? find_next_bit+0x107/0x130 [ 566.381446][ T5436] pcpu_populate_chunk+0xf8/0x940 [ 566.446437][ T5436] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 566.452147][ T5436] ? find_next_bit+0xc7/0x130 [ 566.456811][ T5436] pcpu_alloc+0xd5b/0x1380 [ 566.461232][ T5436] ? pcpu_alloc_area+0x820/0x820 [ 566.466167][ T5436] __alloc_percpu_gfp+0x28/0x30 [ 566.471001][ T5436] array_map_alloc+0x698/0x7d0 [ 566.475751][ T5436] ? array_of_map_free+0x50/0x50 [ 566.480673][ T5436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 566.486891][ T5436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.493127][ T5436] ? array_of_map_free+0x50/0x50 [ 566.498058][ T5436] __do_sys_bpf+0x478/0x3610 [ 566.502632][ T5436] ? bpf_prog_load+0x1960/0x1960 [ 566.507552][ T5436] ? __kasan_check_write+0x14/0x20 [ 566.512645][ T5436] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 566.518171][ T5436] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 566.523438][ T5436] ? wait_for_completion+0x440/0x440 [ 566.528711][ T5436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.534947][ T5436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 566.540394][ T5436] ? do_syscall_64+0x26/0x790 [ 566.545053][ T5436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.551099][ T5436] ? do_syscall_64+0x26/0x790 [ 566.555763][ T5436] __x64_sys_bpf+0x73/0xb0 [ 566.560167][ T5436] do_syscall_64+0xfa/0x790 [ 566.564654][ T5436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.570527][ T5436] RIP: 0033:0x45a919 [ 566.574406][ T5436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 566.593996][ T5436] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 566.602391][ T5436] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 566.610344][ T5436] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000009ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 566.618312][ T5436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 566.626276][ T5436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 566.634228][ T5436] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:17 executing program 2 (fault-call:0 fault-nth:30): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:17 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x40300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)) [ 566.817984][ T5445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.844179][ T5451] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.903250][ T5455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 566.957158][ T5462] FAULT_INJECTION: forcing a failure. [ 566.957158][ T5462] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 567.007943][ T5462] CPU: 1 PID: 5462 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 567.016590][ T5462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.026649][ T5462] Call Trace: [ 567.029958][ T5462] dump_stack+0x197/0x210 [ 567.034296][ T5462] should_fail.cold+0xa/0x15 [ 567.038900][ T5462] ? fault_create_debugfs_attr+0x180/0x180 [ 567.044715][ T5462] ? ___might_sleep+0x163/0x2c0 [ 567.049595][ T5462] should_fail_alloc_page+0x50/0x60 [ 567.054796][ T5462] __alloc_pages_nodemask+0x1a1/0x910 [ 567.060177][ T5462] ? __alloc_pages_slowpath+0x2920/0x2920 [ 567.060202][ T5462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.060216][ T5462] ? find_next_bit+0x107/0x130 [ 567.060237][ T5462] pcpu_populate_chunk+0xf8/0x940 [ 567.060250][ T5462] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 567.060266][ T5462] ? find_next_bit+0xc7/0x130 [ 567.072194][ T5462] pcpu_alloc+0xd5b/0x1380 [ 567.072221][ T5462] ? pcpu_alloc_area+0x820/0x820 [ 567.072249][ T5462] __alloc_percpu_gfp+0x28/0x30 [ 567.072266][ T5462] array_map_alloc+0x698/0x7d0 [ 567.072287][ T5462] ? array_of_map_free+0x50/0x50 [ 567.072307][ T5462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.072321][ T5462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 567.072342][ T5462] ? array_of_map_free+0x50/0x50 [ 567.092498][ T5462] __do_sys_bpf+0x478/0x3610 [ 567.092518][ T5462] ? bpf_prog_load+0x1960/0x1960 [ 567.092533][ T5462] ? __kasan_check_write+0x14/0x20 [ 567.092546][ T5462] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000affffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 567.092560][ T5462] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 567.092576][ T5462] ? wait_for_completion+0x440/0x440 [ 567.092600][ T5462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 567.106798][ T5462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 567.106817][ T5462] ? do_syscall_64+0x26/0x790 [ 567.180943][ T5462] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.187023][ T5462] ? do_syscall_64+0x26/0x790 [ 567.191724][ T5462] __x64_sys_bpf+0x73/0xb0 [ 567.196161][ T5462] do_syscall_64+0xfa/0x790 [ 567.200681][ T5462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.206575][ T5462] RIP: 0033:0x45a919 [ 567.210476][ T5462] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.230083][ T5462] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 567.238505][ T5462] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 567.246483][ T5462] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 567.254462][ T5462] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 567.262446][ T5462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 567.270604][ T5462] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0xffffffffffffff6a, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x401}, 0x0, 0x80, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2e, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x269, 0xe00}, 0x0) 14:20:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 567.336778][ T5481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.360995][ T5483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000bffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 567.621131][ T5500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.655576][ T5503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:18 executing program 2 (fault-call:0 fault-nth:31): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x1c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, r0, 0x8000000000d}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0x0, r2, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0xf8, 0xfa, 0x3, 0x44, 0x0, 0x7, 0x237682f624151dd2, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x100, 0x81, 0x9c, 0xb, 0xf825, 0x1000, 0x5c}, r1, 0x3, 0xffffffffffffffff, 0xc) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x10000) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000cffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:18 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 567.852667][ T5511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.877919][ T5521] FAULT_INJECTION: forcing a failure. [ 567.877919][ T5521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 567.883994][ T5519] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.948612][ T5521] CPU: 1 PID: 5521 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 567.957239][ T5521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.967303][ T5521] Call Trace: [ 567.970616][ T5521] dump_stack+0x197/0x210 [ 567.975144][ T5521] should_fail.cold+0xa/0x15 [ 567.979758][ T5521] ? fault_create_debugfs_attr+0x180/0x180 [ 567.985578][ T5521] ? ___might_sleep+0x163/0x2c0 [ 567.989108][ T5528] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.990450][ T5521] should_fail_alloc_page+0x50/0x60 [ 567.990465][ T5521] __alloc_pages_nodemask+0x1a1/0x910 [ 567.990487][ T5521] ? __alloc_pages_slowpath+0x2920/0x2920 [ 567.990511][ T5521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 567.990526][ T5521] ? find_next_bit+0x107/0x130 [ 567.990557][ T5521] pcpu_populate_chunk+0xf8/0x940 [ 568.030182][ T5521] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.036013][ T5521] ? find_next_bit+0xc7/0x130 [ 568.040716][ T5521] pcpu_alloc+0xd5b/0x1380 14:20:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000dffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 568.045159][ T5521] ? pcpu_alloc_area+0x820/0x820 [ 568.050128][ T5521] __alloc_percpu_gfp+0x28/0x30 [ 568.054990][ T5521] array_map_alloc+0x698/0x7d0 [ 568.059772][ T5521] ? array_of_map_free+0x50/0x50 [ 568.064721][ T5521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.070970][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.077224][ T5521] ? array_of_map_free+0x50/0x50 [ 568.082165][ T5521] __do_sys_bpf+0x478/0x3610 [ 568.082188][ T5521] ? bpf_prog_load+0x1960/0x1960 [ 568.082203][ T5521] ? __kasan_check_write+0x14/0x20 [ 568.082218][ T5521] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 568.082233][ T5521] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 568.082249][ T5521] ? wait_for_completion+0x440/0x440 [ 568.082276][ T5521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.082309][ T5521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 568.082323][ T5521] ? do_syscall_64+0x26/0x790 [ 568.082336][ T5521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.082354][ T5521] ? do_syscall_64+0x26/0x790 [ 568.096964][ T5521] __x64_sys_bpf+0x73/0xb0 [ 568.144537][ T5521] do_syscall_64+0xfa/0x790 [ 568.149038][ T5521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.154914][ T5521] RIP: 0033:0x45a919 [ 568.158795][ T5521] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.178384][ T5521] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 568.186780][ T5521] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 14:20:19 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) socket$kcm(0x29, 0xa, 0x0) [ 568.194748][ T5521] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 568.202709][ T5521] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 568.210668][ T5521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 568.218631][ T5521] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:19 executing program 2 (fault-call:0 fault-nth:32): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 568.341484][ T5539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 568.375247][ T5541] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 568.419481][ T5545] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 568.455768][ T5539] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000effffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 568.492309][ T5549] FAULT_INJECTION: forcing a failure. [ 568.492309][ T5549] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 568.560279][ T5549] CPU: 1 PID: 5549 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 568.569021][ T5549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.569033][ T5549] Call Trace: [ 568.582388][ T5549] dump_stack+0x197/0x210 [ 568.586741][ T5549] should_fail.cold+0xa/0x15 [ 568.591349][ T5549] ? fault_create_debugfs_attr+0x180/0x180 [ 568.597166][ T5549] ? ___might_sleep+0x163/0x2c0 [ 568.602052][ T5549] should_fail_alloc_page+0x50/0x60 [ 568.607273][ T5549] __alloc_pages_nodemask+0x1a1/0x910 [ 568.612662][ T5549] ? __alloc_pages_slowpath+0x2920/0x2920 [ 568.612696][ T5549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.624646][ T5549] ? find_next_bit+0x107/0x130 [ 568.629435][ T5549] pcpu_populate_chunk+0xf8/0x940 [ 568.634470][ T5549] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 568.640197][ T5549] ? find_next_bit+0xc7/0x130 [ 568.644887][ T5549] pcpu_alloc+0xd5b/0x1380 [ 568.649319][ T5549] ? pcpu_alloc_area+0x820/0x820 [ 568.654280][ T5549] __alloc_percpu_gfp+0x28/0x30 [ 568.659144][ T5549] array_map_alloc+0x698/0x7d0 [ 568.663914][ T5549] ? array_of_map_free+0x50/0x50 [ 568.668846][ T5549] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 568.675087][ T5549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 568.681343][ T5549] ? array_of_map_free+0x50/0x50 [ 568.687851][ T5549] __do_sys_bpf+0x478/0x3610 [ 568.692463][ T5549] ? bpf_prog_load+0x1960/0x1960 [ 568.697400][ T5549] ? __kasan_check_write+0x14/0x20 [ 568.702524][ T5549] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 568.708083][ T5549] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 568.713359][ T5549] ? wait_for_completion+0x440/0x440 [ 568.713383][ T5549] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 568.713412][ T5549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 568.713431][ T5549] ? do_syscall_64+0x26/0x790 [ 568.713444][ T5549] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.713458][ T5549] ? do_syscall_64+0x26/0x790 [ 568.713480][ T5549] __x64_sys_bpf+0x73/0xb0 [ 568.713497][ T5549] do_syscall_64+0xfa/0x790 [ 568.713519][ T5549] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:20:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x200300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) socket$kcm(0x29, 0x2, 0x0) [ 568.760639][ T5549] RIP: 0033:0x45a919 [ 568.764543][ T5549] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.784152][ T5549] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 568.792570][ T5549] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 568.800546][ T5549] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 568.808524][ T5549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 568.816504][ T5549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 568.824488][ T5549] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 568.870081][ T5570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:19 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 568.975551][ T5570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 569.050014][ T5577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, r0, 0x0, 0x8, &(0x7f0000000200)='@+/eth1\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) close(r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8f7d9ffcd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36bc1107b9cf2a89a797cd5c578f00"/156], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) close(r6) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x6, 0xa8, 0x7f, 0x0, 0x2, 0x8301, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x5, @perf_bp={&(0x7f0000000040), 0x8}, 0x20, 0x4, 0xb2, 0x5, 0xc5, 0x0, 0xfffe}, r2, 0xffffffffffffffff, r6, 0x1) 14:20:20 executing program 2 (fault-call:0 fault-nth:33): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.121124][ T5581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e43160000000fffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 569.295300][ T5594] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 569.302260][ T5593] FAULT_INJECTION: forcing a failure. [ 569.302260][ T5593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x240300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.404747][ T5593] CPU: 1 PID: 5593 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 569.413387][ T5593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.423454][ T5593] Call Trace: [ 569.426764][ T5593] dump_stack+0x197/0x210 [ 569.431113][ T5593] should_fail.cold+0xa/0x15 [ 569.435723][ T5593] ? fault_create_debugfs_attr+0x180/0x180 [ 569.441543][ T5593] ? ___might_sleep+0x163/0x2c0 [ 569.446420][ T5593] should_fail_alloc_page+0x50/0x60 14:20:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.451632][ T5593] __alloc_pages_nodemask+0x1a1/0x910 [ 569.457025][ T5593] ? __alloc_pages_slowpath+0x2920/0x2920 [ 569.462764][ T5593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.469011][ T5593] ? find_next_bit+0x107/0x130 [ 569.473798][ T5593] pcpu_populate_chunk+0xf8/0x940 [ 569.478828][ T5593] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 569.484550][ T5593] ? find_next_bit+0xc7/0x130 [ 569.489250][ T5593] pcpu_alloc+0xd5b/0x1380 [ 569.493687][ T5593] ? pcpu_alloc_area+0x820/0x820 [ 569.498646][ T5593] __alloc_percpu_gfp+0x28/0x30 [ 569.503523][ T5593] array_map_alloc+0x698/0x7d0 [ 569.508324][ T5593] ? array_of_map_free+0x50/0x50 [ 569.513277][ T5593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.519526][ T5593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.525779][ T5593] ? array_of_map_free+0x50/0x50 [ 569.530729][ T5593] __do_sys_bpf+0x478/0x3610 [ 569.535337][ T5593] ? bpf_prog_load+0x1960/0x1960 [ 569.540284][ T5593] ? __kasan_check_write+0x14/0x20 [ 569.545399][ T5593] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.550947][ T5593] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 569.556242][ T5593] ? wait_for_completion+0x440/0x440 [ 569.561551][ T5593] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.561585][ T5593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.561599][ T5593] ? do_syscall_64+0x26/0x790 [ 569.561614][ T5593] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.561628][ T5593] ? do_syscall_64+0x26/0x790 [ 569.561650][ T5593] __x64_sys_bpf+0x73/0xb0 [ 569.561673][ T5593] do_syscall_64+0xfa/0x790 [ 569.573595][ T5593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.573607][ T5593] RIP: 0033:0x45a919 [ 569.573629][ T5593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.573637][ T5593] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.573652][ T5593] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 569.573661][ T5593] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 569.573669][ T5593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.573684][ T5593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 569.593680][ T5593] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:20 executing program 2 (fault-call:0 fault-nth:34): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 569.705272][ T5619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 569.753110][ T5623] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 569.771354][ T5624] FAULT_INJECTION: forcing a failure. [ 569.771354][ T5624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 569.810440][ T5624] CPU: 0 PID: 5624 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 569.819075][ T5624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.829141][ T5624] Call Trace: [ 569.832451][ T5624] dump_stack+0x197/0x210 [ 569.836798][ T5624] should_fail.cold+0xa/0x15 [ 569.841405][ T5624] ? fault_create_debugfs_attr+0x180/0x180 [ 569.847214][ T5624] ? ___might_sleep+0x163/0x2c0 [ 569.847243][ T5624] should_fail_alloc_page+0x50/0x60 [ 569.847260][ T5624] __alloc_pages_nodemask+0x1a1/0x910 [ 569.862652][ T5624] ? __alloc_pages_slowpath+0x2920/0x2920 [ 569.868393][ T5624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.874637][ T5624] ? find_next_bit+0x107/0x130 [ 569.874664][ T5624] pcpu_populate_chunk+0xf8/0x940 [ 569.884596][ T5624] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 569.890321][ T5624] ? find_next_bit+0xc7/0x130 [ 569.890348][ T5624] pcpu_alloc+0xd5b/0x1380 [ 569.890376][ T5624] ? pcpu_alloc_area+0x820/0x820 [ 569.890405][ T5624] __alloc_percpu_gfp+0x28/0x30 [ 569.904570][ T5624] array_map_alloc+0x698/0x7d0 [ 569.904592][ T5624] ? array_of_map_free+0x50/0x50 [ 569.904613][ T5624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 569.919119][ T5624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 569.931562][ T5624] ? array_of_map_free+0x50/0x50 [ 569.931580][ T5624] __do_sys_bpf+0x478/0x3610 [ 569.931601][ T5624] ? bpf_prog_load+0x1960/0x1960 [ 569.931616][ T5624] ? __kasan_check_write+0x14/0x20 [ 569.931628][ T5624] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:20 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/38) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x200) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200)="af2964f2bd98c39f652cae8c1ee45c2341e43cf98101b77169c7fc547b61583d1f9e7770a7c35b77379438b097a813bf4077e73769d7575223a6e556ca3f4c47f0afd36c4a07bfdd1648b4fbb87cc0de517049c06efa19547d2bcc466e02fb51", &(0x7f0000000280)="52484ec16cf714c0b991628a6034f958b2adc8b2a7f90de5fbe9a88d928abebb2138b904ce3a9f81ebde573fa35344bba8947141f41b9b8e30f5fd1974117f8cee56fc57de16ede9ec327c9b482b2d4d574365889621ca3dccef9ec7a92c329ecae552178c6086b3d28160ccbffedcf7a0885bcb2ec90c3d9ac72c4dd7aa473971046b694fa31aa31d"}, 0x20) 14:20:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000011ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:20 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.931646][ T5624] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 569.941169][ T5624] ? wait_for_completion+0x440/0x440 [ 569.941195][ T5624] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.941227][ T5624] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.941241][ T5624] ? do_syscall_64+0x26/0x790 [ 569.941253][ T5624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.941270][ T5624] ? do_syscall_64+0x26/0x790 [ 569.951323][ T5624] __x64_sys_bpf+0x73/0xb0 [ 569.951343][ T5624] do_syscall_64+0xfa/0x790 [ 569.951362][ T5624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.951380][ T5624] RIP: 0033:0x45a919 [ 569.962192][ T5624] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.962200][ T5624] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.962213][ T5624] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 569.962222][ T5624] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:20 executing program 2 (fault-call:0 fault-nth:35): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x3c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 569.962231][ T5624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.962238][ T5624] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 569.962247][ T5624] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 570.040251][ T5635] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 570.250396][ T5638] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 570.283107][ T5653] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 570.294228][ T5648] FAULT_INJECTION: forcing a failure. [ 570.294228][ T5648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.317131][ T5648] CPU: 0 PID: 5648 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 570.325747][ T5648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.335814][ T5648] Call Trace: [ 570.339122][ T5648] dump_stack+0x197/0x210 [ 570.343477][ T5648] should_fail.cold+0xa/0x15 14:20:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000012ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 570.348086][ T5648] ? fault_create_debugfs_attr+0x180/0x180 [ 570.353895][ T5648] ? ___might_sleep+0x163/0x2c0 [ 570.358752][ T5648] should_fail_alloc_page+0x50/0x60 [ 570.363955][ T5648] __alloc_pages_nodemask+0x1a1/0x910 [ 570.369344][ T5648] ? __alloc_pages_slowpath+0x2920/0x2920 [ 570.375256][ T5648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.381512][ T5648] ? find_next_bit+0x107/0x130 [ 570.386321][ T5648] pcpu_populate_chunk+0xf8/0x940 [ 570.391358][ T5648] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 570.397068][ T5648] ? find_next_bit+0xc7/0x130 [ 570.401737][ T5648] pcpu_alloc+0xd5b/0x1380 [ 570.406143][ T5648] ? pcpu_alloc_area+0x820/0x820 [ 570.411085][ T5648] __alloc_percpu_gfp+0x28/0x30 [ 570.415934][ T5648] array_map_alloc+0x698/0x7d0 [ 570.420695][ T5648] ? array_of_map_free+0x50/0x50 [ 570.425616][ T5648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.431859][ T5648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 570.438094][ T5648] ? array_of_map_free+0x50/0x50 [ 570.443027][ T5648] __do_sys_bpf+0x478/0x3610 [ 570.447601][ T5648] ? bpf_prog_load+0x1960/0x1960 [ 570.452520][ T5648] ? __kasan_check_write+0x14/0x20 [ 570.457612][ T5648] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 570.463141][ T5648] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 570.468405][ T5648] ? wait_for_completion+0x440/0x440 [ 570.473688][ T5648] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.479929][ T5648] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.485368][ T5648] ? do_syscall_64+0x26/0x790 [ 570.490035][ T5648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.496083][ T5648] ? do_syscall_64+0x26/0x790 [ 570.500744][ T5648] __x64_sys_bpf+0x73/0xb0 [ 570.505303][ T5648] do_syscall_64+0xfa/0x790 [ 570.509818][ T5648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.515697][ T5648] RIP: 0033:0x45a919 [ 570.519587][ T5648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:20:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 570.544563][ T5648] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 570.552966][ T5648] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 570.560934][ T5648] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 570.568895][ T5648] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.576862][ T5648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 570.584818][ T5648] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:21 executing program 2 (fault-call:0 fault-nth:36): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 570.708433][ T5631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 570.730952][ T5661] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x345, 0xe00}, 0x2363ad7835104161) 14:20:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x4000a0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 570.780794][ T5669] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 570.816083][ T5671] FAULT_INJECTION: forcing a failure. [ 570.816083][ T5671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:20:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000013ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 570.879480][ T5671] CPU: 1 PID: 5671 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 570.888117][ T5671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.898174][ T5671] Call Trace: [ 570.898207][ T5671] dump_stack+0x197/0x210 [ 570.905795][ T5671] should_fail.cold+0xa/0x15 [ 570.910402][ T5671] ? fault_create_debugfs_attr+0x180/0x180 [ 570.916231][ T5671] ? ___might_sleep+0x163/0x2c0 [ 570.921113][ T5671] should_fail_alloc_page+0x50/0x60 [ 570.926307][ T5671] __alloc_pages_nodemask+0x1a1/0x910 [ 570.931686][ T5671] ? __alloc_pages_slowpath+0x2920/0x2920 [ 570.937440][ T5671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.943686][ T5671] ? find_next_bit+0x107/0x130 [ 570.948471][ T5671] pcpu_populate_chunk+0xf8/0x940 [ 570.953500][ T5671] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 570.959213][ T5671] ? find_next_bit+0xc7/0x130 [ 570.959241][ T5671] pcpu_alloc+0xd5b/0x1380 [ 570.959266][ T5671] ? pcpu_alloc_area+0x820/0x820 [ 570.959295][ T5671] __alloc_percpu_gfp+0x28/0x30 [ 570.959312][ T5671] array_map_alloc+0x698/0x7d0 [ 570.959339][ T5671] ? array_of_map_free+0x50/0x50 [ 570.959363][ T5671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 570.959385][ T5671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 571.000328][ T5671] ? array_of_map_free+0x50/0x50 [ 571.005281][ T5671] __do_sys_bpf+0x478/0x3610 [ 571.009895][ T5671] ? bpf_prog_load+0x1960/0x1960 [ 571.014848][ T5671] ? __kasan_check_write+0x14/0x20 [ 571.020089][ T5671] ? __mutex_unlock_slowpath+0xf0/0x6a0 14:20:21 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 571.025685][ T5671] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 571.030985][ T5671] ? wait_for_completion+0x440/0x440 [ 571.036300][ T5671] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 571.042576][ T5671] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.048050][ T5671] ? do_syscall_64+0x26/0x790 [ 571.052740][ T5671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.058814][ T5671] ? do_syscall_64+0x26/0x790 [ 571.063503][ T5671] __x64_sys_bpf+0x73/0xb0 [ 571.067933][ T5671] do_syscall_64+0xfa/0x790 [ 571.072451][ T5671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.078339][ T5671] RIP: 0033:0x45a919 [ 571.082241][ T5671] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 571.082249][ T5671] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 571.082262][ T5671] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 571.082269][ T5671] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 14:20:22 executing program 2 (fault-call:0 fault-nth:37): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 571.082277][ T5671] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.082284][ T5671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 571.082292][ T5671] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x400300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 571.195609][ T5690] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.220792][ T5691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.273736][ T5693] FAULT_INJECTION: forcing a failure. [ 571.273736][ T5693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 571.289652][ T5693] CPU: 0 PID: 5693 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 571.298267][ T5693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.308331][ T5693] Call Trace: [ 571.311631][ T5693] dump_stack+0x197/0x210 [ 571.315958][ T5693] should_fail.cold+0xa/0x15 [ 571.320559][ T5693] ? fault_create_debugfs_attr+0x180/0x180 [ 571.326372][ T5693] ? ___might_sleep+0x163/0x2c0 [ 571.331245][ T5693] should_fail_alloc_page+0x50/0x60 [ 571.336452][ T5693] __alloc_pages_nodemask+0x1a1/0x910 [ 571.341842][ T5693] ? __alloc_pages_slowpath+0x2920/0x2920 [ 571.347580][ T5693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 571.347599][ T5693] ? find_next_bit+0x107/0x130 [ 571.358590][ T5693] pcpu_populate_chunk+0xf8/0x940 [ 571.363620][ T5693] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 571.369347][ T5693] ? find_next_bit+0xc7/0x130 [ 571.369373][ T5693] pcpu_alloc+0xd5b/0x1380 [ 571.369400][ T5693] ? pcpu_alloc_area+0x820/0x820 [ 571.369427][ T5693] __alloc_percpu_gfp+0x28/0x30 [ 571.383430][ T5693] array_map_alloc+0x698/0x7d0 [ 571.383452][ T5693] ? array_of_map_free+0x50/0x50 [ 571.393042][ T5693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 571.404188][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 571.410436][ T5693] ? array_of_map_free+0x50/0x50 [ 571.410454][ T5693] __do_sys_bpf+0x478/0x3610 [ 571.410476][ T5693] ? bpf_prog_load+0x1960/0x1960 [ 571.410491][ T5693] ? __kasan_check_write+0x14/0x20 [ 571.410509][ T5693] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 571.420521][ T5693] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 571.420539][ T5693] ? wait_for_completion+0x440/0x440 [ 571.420568][ T5693] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 571.430588][ T5693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.430604][ T5693] ? do_syscall_64+0x26/0x790 [ 571.430617][ T5693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.430634][ T5693] ? do_syscall_64+0x26/0x790 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000014ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 571.452938][ T5693] __x64_sys_bpf+0x73/0xb0 [ 571.452957][ T5693] do_syscall_64+0xfa/0x790 [ 571.452978][ T5693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.463076][ T5693] RIP: 0033:0x45a919 [ 571.463093][ T5693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 571.463102][ T5693] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 14:20:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000140)) r1 = socket$kcm(0x10, 0x2, 0x0) socketpair(0xa, 0x2, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r3}) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 571.463119][ T5693] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 571.473816][ T5693] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 571.473829][ T5693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.492454][ T5693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 571.492463][ T5693] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 14:20:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x15, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe1000040", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) [ 571.620261][ T5712] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.647860][ T5714] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000015ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 571.703012][ T5715] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.898060][ T5731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.961720][ T5738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.002663][ T5743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:22 executing program 2 (fault-call:0 fault-nth:38): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:22 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x440300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000016ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) r1 = socket$kcm(0x29, 0xa, 0x0) sendmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000001800)=@rc={0x1f, {0x1, 0x1, 0x8, 0x7f, 0x7f, 0x80}, 0x1}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001880)="9aee98ce001cd73d33e413a6670667ef9f9922488133272dcf48e0daf79636bbbed301172b0f22255c6df4719887de70605c553330f5eca0a05539a5499a62a53777b490a5992203b135808307e0f2d0f93857d4c11bf2f9a225ddd6b6d5", 0x5e}, {&(0x7f0000001900)="344125d522aa6b62e79ba1d34f9e4d1d356ddc635b9f17fee1331e2bbfacb32fed9039344fb8834ad632dc2a8a79cbc57068024b08f7d1e3bd7b5e17653990d3ba77fe0e497400726859c9449c3a55299c6a86f8e32e34a70702966717edb1a68c", 0x61}, {&(0x7f0000001980)="fcc89f3944ae509ed04f5c1dd314387af5c988adb4fa7f4defdd8409649c17d48955a80137caee828d8392f041af0fbcb5fff9138ec51ba281c5b540fa06e5ceb480f5bfc51e855c6904a5b8ad4595649868df4a8d64a5d0480b932b89ba1cd1", 0x60}, {&(0x7f0000001a00)="89f254c918219796b530f55dcb551e8c9f40632e914eff148dadbecdf59e7f5ae7e2f2c58da933921e04500cd2ae9e97c6c347ed2f833dff7698a1ad6361a2257b1388d1c4fcacb98b5c4d8e0d8ddd13b39b2951c99165de19239014070514be8b6ef9520dbe7772a31bbe680ba37583282ae00d250b946c4ef1705488adf637f55dedb053e1c1dbf6fb09afe6942975f485837c1ed0b68df170ce93516b549385a6b0f6751546280b65fc498a07d263ce8324f4e556809f2e6d98642a3dea93ecd7f8ae7298f36f51b19a808b8d16c33f52a86714b2ab8961288456579b1015c76326c4684356", 0xe7}, {&(0x7f0000001b00)="107f880b931694ec2f8d7e16f0d4549a800dfc68ad9040d4022754c2439008f995a44c5adff3755f7d3f0ae806060b59b6638adfabd11f63e1db0b94598de068749749bccaee31b54f3e640c08cd80b6d25028aaecd17bda6aaff39772dc9999e123e08a8f716e5bed7f68fbb86a8c8d74799e30b23a80a70dc1d9a701c53b6e56c00af4a5b514c41342ed6f64aeea58ab63012da727b8a9ade8ee17dc8ea4a5c632707aa6995dd333a485da88230f3721dfd291ff8c5d8f2757cbbc1dd4c25e4d32eef0825374b8c4dbb621c875159b9e3098428b1c3a005f4e7f5e22460f9670e36d210ecd5167350f13ac29c629c8b0a9caff", 0xf4}, {&(0x7f0000001c00)="981bec034f08d525cbae7c3986d0b71ccafa8ddc55f5fcda831d707c50abcd5a433cce5dce730ea869d2fb", 0x2b}], 0x6, &(0x7f0000001cc0)=[{0x20, 0x102, 0x7f, "692da202e02b404d00cc8e7af747bb68"}, {0x70, 0x113, 0x6, "d0499987e64d424cc9b28ab4503aaba868b1c17ac64c36e89189375edf7f3bf7ff2a9e6554b6b29691721964c32406a1ff916e9b82ea40cebcbc517ae4d69e10d8bb8e73f93b4c5e894e8c97078aa0ec200282b33a657e119fc46dea"}, {0x68, 0x6, 0x3, "299412a022ace5a4f8a13193147f5dc62e6dafa4b22886e1f1e8309b36f75273543703af0ec16d0bd29a2d946c91d303a9d40dc5b4471b0e845a13cb703780eaf9906459032a3f1888f1d4871fc13378973df4"}, {0x10, 0x10f, 0xfffffffd}], 0x108}, 0x61043) 14:20:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x97, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 572.265407][ T5761] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.272649][ T5759] FAULT_INJECTION: forcing a failure. [ 572.272649][ T5759] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 572.323542][ T5763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.349741][ T5759] CPU: 0 PID: 5759 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 572.358372][ T5759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.368432][ T5759] Call Trace: 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 572.371739][ T5759] dump_stack+0x197/0x210 [ 572.376093][ T5759] should_fail.cold+0xa/0x15 [ 572.380699][ T5759] ? fault_create_debugfs_attr+0x180/0x180 [ 572.386514][ T5759] ? ___might_sleep+0x163/0x2c0 [ 572.391384][ T5759] should_fail_alloc_page+0x50/0x60 [ 572.396588][ T5759] __alloc_pages_nodemask+0x1a1/0x910 [ 572.401968][ T5759] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 572.407532][ T5759] ? __alloc_pages_slowpath+0x2920/0x2920 [ 572.413275][ T5759] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 572.419530][ T5759] alloc_pages_current+0x107/0x210 [ 572.424647][ T5759] ? ___might_sleep+0x163/0x2c0 [ 572.429511][ T5759] __vmalloc_node_range+0x4f8/0x810 [ 572.434732][ T5759] __vmalloc+0x44/0x50 [ 572.438813][ T5759] ? pcpu_mem_zalloc+0x8a/0xf0 [ 572.443587][ T5759] pcpu_mem_zalloc+0x8a/0xf0 [ 572.448192][ T5759] pcpu_create_chunk+0x12d/0x7f0 [ 572.453132][ T5759] pcpu_alloc+0x10f3/0x1380 [ 572.457651][ T5759] ? pcpu_alloc_area+0x820/0x820 [ 572.462606][ T5759] __alloc_percpu_gfp+0x28/0x30 [ 572.467466][ T5759] array_map_alloc+0x698/0x7d0 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x5c0300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 572.472244][ T5759] ? array_of_map_free+0x50/0x50 [ 572.477201][ T5759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 572.483442][ T5759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 572.489692][ T5759] ? array_of_map_free+0x50/0x50 [ 572.494651][ T5759] __do_sys_bpf+0x478/0x3610 [ 572.499249][ T5759] ? bpf_prog_load+0x1960/0x1960 [ 572.504191][ T5759] ? __kasan_check_write+0x14/0x20 [ 572.509301][ T5759] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 572.509710][ T5767] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.514846][ T5759] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 572.514864][ T5759] ? wait_for_completion+0x440/0x440 [ 572.514891][ T5759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 572.514922][ T5759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 572.514942][ T5759] ? do_syscall_64+0x26/0x790 [ 572.549113][ T5759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.555191][ T5759] ? do_syscall_64+0x26/0x790 [ 572.559886][ T5759] __x64_sys_bpf+0x73/0xb0 [ 572.564317][ T5759] do_syscall_64+0xfa/0x790 [ 572.568835][ T5759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.574730][ T5759] RIP: 0033:0x45a919 [ 572.578627][ T5759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 572.598223][ T5759] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 572.606626][ T5759] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 572.606635][ T5759] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 572.606642][ T5759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.606650][ T5759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 572.606657][ T5759] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 572.660040][ T5763] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:20:23 executing program 2 (fault-call:0 fault-nth:39): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x44, 0x0, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000017ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9010300000ef000009e40f088481fffffe100004000632177fbac141414e0", 0x0, 0x104, 0x6000000000000000}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x240, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) 14:20:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:20:23 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) recvmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000080)=""/47, 0x2f}, {&(0x7f0000000300)=""/189, 0xbd}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000100)=""/125, 0x7d}, {&(0x7f0000000540)=""/231, 0xe7}, {&(0x7f00000003c0)=""/48, 0x30}], 0x7, &(0x7f00000006c0)=""/38, 0x26}, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d2b1f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19524c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b087a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8b38ef57b03b85b2582730dfff52d5039d41ef8e25316c4d79cf46a63a1a387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64b8e93e037a92061e153afb49d0b6c52fe49308e5ecdb03d5cad40b99d9d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad13c7e78915e204db795164bc0f1955de204510b49b139503082dafb7a0ae2f18e25d354d2cfc08f6cd9481bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be31db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2fbcbec00000000000015b9b161913c50901f2828b05a02877ffe387ba36a85d97233761ac57035a86c46545abf2704c5c76e8acd20c9f68410a489a60159cc54336ebbb807a64f986912ef1eaad6a448ec961c1b7dd9cac3b299f7ac68636c5acb78ffc8f6d7d1b71137b521df67ae30a54df091381a4645bd307735159c4101fe59f6103cc1e5b20fa799627e139764cb6c0347c622f239"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r3, r2, 0x8000000000d}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x70, 0x40, 0x6, 0x0, 0x0, 0x0, 0x0, 0x800, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x5}, r3, 0x0, r4, 0x0) perf_event_open$cgroup(&(0x7f00000007c0)={0x519eb629485a5be7, 0x70, 0x0, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000780), 0x2}, 0x0, 0xffffffff, 0x6, 0x6, 0x9, 0x0, 0x83e6}, 0xffffffffffffffff, 0xc, r4, 0x5) r5 = openat$cgroup_ro(r4, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000008c0)={r5, &(0x7f0000000780)="1bd5d6075c5316aa5ddccb9018e2787b112f7935e7d0ac298d08589ebea63fbcec2039879813127be5a8a96809f194d1d77e8280ea8cce25ea331fb4fa87a186aba21bb2e48bc2", &(0x7f0000000800)="3def523d752b8a069f7b387ea38b92db2019221550dd4d6ba78cb68bbe0941081f64fb07d9937b94dca7876cf82858c0712af7725bbefe106445561c97766ecd1bd9f29266b03c2b84fb9624046ebe9ebd1d3b6b14fdb939163dff34ff7bce267eabef3d04327a1613aa2d317465f0bb496c1659515ee48a4efe22f0bd16880dded4b0113f173857f86dc678ca0247856af9a2", 0x6}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000040ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 572.842256][ T5795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.875709][ T5801] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.882827][ T5799] FAULT_INJECTION: forcing a failure. 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600200, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 572.882827][ T5799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 572.911658][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 572.920293][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.930360][ T5799] Call Trace: [ 572.933681][ T5799] dump_stack+0x197/0x210 [ 572.938034][ T5799] should_fail.cold+0xa/0x15 [ 572.942634][ T5799] ? fault_create_debugfs_attr+0x180/0x180 [ 572.948440][ T5799] ? ___might_sleep+0x163/0x2c0 [ 572.953309][ T5799] should_fail_alloc_page+0x50/0x60 [ 572.958514][ T5799] __alloc_pages_nodemask+0x1a1/0x910 [ 572.963890][ T5799] ? find_held_lock+0x35/0x130 [ 572.968661][ T5799] ? __alloc_pages_slowpath+0x2920/0x2920 [ 572.974394][ T5799] ? lock_downgrade+0x920/0x920 [ 572.974412][ T5799] ? rwlock_bug.part.0+0x90/0x90 [ 572.974429][ T5799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 572.974451][ T5799] alloc_pages_current+0x107/0x210 [ 572.974470][ T5799] __get_free_pages+0xc/0x40 [ 572.974488][ T5799] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 572.984267][ T5799] apply_to_page_range+0x445/0x700 [ 572.984289][ T5799] ? memset+0x40/0x40 [ 572.984314][ T5799] kasan_populate_vmalloc+0x68/0x90 [ 572.984332][ T5799] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 572.984352][ T5799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.031446][ T5799] pcpu_create_chunk+0x24e/0x7f0 [ 573.036400][ T5799] pcpu_alloc+0x10f3/0x1380 [ 573.040935][ T5799] ? pcpu_alloc_area+0x820/0x820 [ 573.045894][ T5799] __alloc_percpu_gfp+0x28/0x30 [ 573.050760][ T5799] array_map_alloc+0x698/0x7d0 [ 573.055539][ T5799] ? array_of_map_free+0x50/0x50 [ 573.060493][ T5799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 573.066738][ T5799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.072989][ T5799] ? array_of_map_free+0x50/0x50 [ 573.077936][ T5799] __do_sys_bpf+0x478/0x3610 [ 573.082542][ T5799] ? bpf_prog_load+0x1960/0x1960 [ 573.087490][ T5799] ? __kasan_check_write+0x14/0x20 14:20:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x600300, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x640000, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) [ 573.092610][ T5799] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 573.098174][ T5799] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 573.103493][ T5799] ? wait_for_completion+0x440/0x440 [ 573.108798][ T5799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 573.115065][ T5799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.120530][ T5799] ? do_syscall_64+0x26/0x790 [ 573.125210][ T5799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.131281][ T5799] ? do_syscall_64+0x26/0x790 [ 573.135975][ T5799] __x64_sys_bpf+0x73/0xb0 [ 573.140393][ T5799] do_syscall_64+0xfa/0x790 [ 573.144895][ T5799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.150784][ T5799] RIP: 0033:0x45a919 [ 573.154685][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.174414][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.182837][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 573.190817][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 573.198793][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.206767][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 573.214741][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 573.224687][ T5799] ================================================================== [ 573.233096][ T5799] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 573.240626][ T5799] Write of size 32768 at addr ffffe8ffffa00000 by task syz-executor.2/5799 [ 573.249195][ T5799] [ 573.251619][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 573.260193][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.270240][ T5799] Call Trace: [ 573.273529][ T5799] dump_stack+0x197/0x210 [ 573.277842][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.282428][ T5799] print_address_description.constprop.0.cold+0x5/0x30b [ 573.289367][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.293940][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.298524][ T5799] __kasan_report.cold+0x1b/0x41 [ 573.303464][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.308038][ T5799] kasan_report+0x12/0x20 [ 573.312363][ T5799] check_memory_region+0x134/0x1a0 [ 573.317505][ T5799] memset+0x24/0x40 [ 573.321297][ T5799] pcpu_alloc+0x589/0x1380 [ 573.325704][ T5799] ? pcpu_alloc_area+0x820/0x820 [ 573.330632][ T5799] __alloc_percpu_gfp+0x28/0x30 [ 573.335470][ T5799] array_map_alloc+0x698/0x7d0 [ 573.340220][ T5799] ? array_of_map_free+0x50/0x50 [ 573.345142][ T5799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 573.351364][ T5799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.357587][ T5799] ? array_of_map_free+0x50/0x50 [ 573.362508][ T5799] __do_sys_bpf+0x478/0x3610 [ 573.367083][ T5799] ? bpf_prog_load+0x1960/0x1960 [ 573.372003][ T5799] ? __kasan_check_write+0x14/0x20 [ 573.377100][ T5799] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 573.382628][ T5799] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 573.387933][ T5799] ? wait_for_completion+0x440/0x440 [ 573.393227][ T5799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 573.399480][ T5799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.404933][ T5799] ? do_syscall_64+0x26/0x790 [ 573.409683][ T5799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.415828][ T5799] ? do_syscall_64+0x26/0x790 [ 573.420499][ T5799] __x64_sys_bpf+0x73/0xb0 [ 573.424905][ T5799] do_syscall_64+0xfa/0x790 [ 573.429393][ T5799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.435265][ T5799] RIP: 0033:0x45a919 [ 573.439145][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.458740][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.467146][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 573.475124][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 573.483079][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.491034][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 573.498987][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 573.506963][ T5799] [ 573.509280][ T5799] [ 573.511586][ T5799] Memory state around the buggy address: [ 573.517206][ T5799] ffffe8ffff9fff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 573.525249][ T5799] ffffe8ffff9fff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 573.533294][ T5799] >ffffe8ffffa00000: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 573.541333][ T5799] ^ 14:20:24 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x640100, 0xffffffffffffffff, 0x0, [0x5, 0x0, 0x0, 0x400100, 0x5]}, 0x3c) 14:20:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x29, &(0x7f0000002a80)=ANY=[@ANYBLOB="180000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9eaf3860bf492a8e4afc28ac1f48f4c4bbb43728e1ac1b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05fd4cc13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a3"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000080000000000950000006c000000fed9d1cd8dbd3b8f886e17ec23b6c0c178e7bc8d7d7c1c544f39b7318cf224ab3e6bdec6864273fe91e992bd05a99f441062a59623ce237de1c4eac6a27695e8296aa002c7e5d6d397738e2136fa886c284cca8aea"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x10, &(0x7f00000002c0)={0x0, 0x0, r3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x14, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000800000000000000000085000000360000009500000000000000e8b6a6f350e4edfd19eac129c4f9d7baa9d3f2729d1db423a1813af64347b04026a2b85b20bec19902e7195f5e2ebd97c2a90a11c24ef59a7011e8063fff73c91906f2b9fc272a8b55685a16fbfb7dfa35dbbb3e802508136058cc7f6ea977019081a799c5c1000c0b4add85af950152ccd6546ba736fafaeb327a3cb22c54020d"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000300000000000000000100e9840000000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000000080)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xf, 0x7fff, 0x4}, 0x10, r3, r4}, 0x78) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)="2e000000130081c5e4050cecdb4cb9040a485e431600000018ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 573.545390][ T5799] ffffe8ffffa00080: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 573.553432][ T5799] ffffe8ffffa00100: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 [ 573.561471][ T5799] ================================================================== [ 573.569518][ T5799] Disabling lock debugging due to kernel taint 14:20:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="8500000007000000c60000000000be0095000000000000003cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="de535344d4bd389b2248e61053df", 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 573.638917][ T5799] Kernel panic - not syncing: panic_on_warn set ... [ 573.645548][ T5799] CPU: 0 PID: 5799 Comm: syz-executor.2 Tainted: G B 5.5.0-rc1-syzkaller #0 [ 573.655524][ T5799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.665576][ T5799] Call Trace: [ 573.668861][ T5799] dump_stack+0x197/0x210 [ 573.673173][ T5799] panic+0x2e3/0x75c [ 573.677070][ T5799] ? add_taint.cold+0x16/0x16 [ 573.681728][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.686304][ T5799] ? preempt_schedule+0x4b/0x60 [ 573.691136][ T5799] ? ___preempt_schedule+0x16/0x18 [ 573.696231][ T5799] ? trace_hardirqs_on+0x5e/0x240 [ 573.701235][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.705804][ T5799] end_report+0x47/0x4f [ 573.709940][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.714508][ T5799] __kasan_report.cold+0xe/0x41 [ 573.719340][ T5799] ? pcpu_alloc+0x589/0x1380 [ 573.723923][ T5799] kasan_report+0x12/0x20 [ 573.728317][ T5799] check_memory_region+0x134/0x1a0 [ 573.733404][ T5799] memset+0x24/0x40 [ 573.737194][ T5799] pcpu_alloc+0x589/0x1380 [ 573.741594][ T5799] ? pcpu_alloc_area+0x820/0x820 [ 573.746517][ T5799] __alloc_percpu_gfp+0x28/0x30 [ 573.751347][ T5799] array_map_alloc+0x698/0x7d0 [ 573.756093][ T5799] ? array_of_map_free+0x50/0x50 [ 573.761011][ T5799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 573.767236][ T5799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 573.773460][ T5799] ? array_of_map_free+0x50/0x50 [ 573.778388][ T5799] __do_sys_bpf+0x478/0x3610 [ 573.782969][ T5799] ? bpf_prog_load+0x1960/0x1960 [ 573.787885][ T5799] ? __kasan_check_write+0x14/0x20 [ 573.792976][ T5799] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 573.798506][ T5799] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 573.803771][ T5799] ? wait_for_completion+0x440/0x440 [ 573.809039][ T5799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 573.815267][ T5799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 573.820791][ T5799] ? do_syscall_64+0x26/0x790 [ 573.825453][ T5799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.831501][ T5799] ? do_syscall_64+0x26/0x790 [ 573.836163][ T5799] __x64_sys_bpf+0x73/0xb0 [ 573.840560][ T5799] do_syscall_64+0xfa/0x790 [ 573.845043][ T5799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 573.850915][ T5799] RIP: 0033:0x45a919 [ 573.854924][ T5799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 573.874524][ T5799] RSP: 002b:00007f3d2a790c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.882925][ T5799] RAX: ffffffffffffffda RBX: 00007f3d2a790c90 RCX: 000000000045a919 [ 573.890885][ T5799] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 573.898836][ T5799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 573.906791][ T5799] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d2a7916d4 [ 573.914742][ T5799] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000003 [ 573.924148][ T5799] Kernel Offset: disabled [ 573.928475][ T5799] Rebooting in 86400 seconds..